|   
          | Advertisement Product description:FOR FREE DEMO contact :
 Email : raj@apex-online-it-training.com
 
 Phone/WhatsApp : +91-(850) 012-2107
 
 USA Number : 214-628-3894
 
 Gtalk : raavi.sriraja@gmail.com
 
 Blog: https://best-online-it-training-institute.blogspot.com
 
 
 
 Cyber Security Interview Questions and Answers, Recorded Video Sessions, Materials, Mock Interviews Assignments Will be provided
 
 
 CYBER SECURITY COURSE CONTENT
 
 (the course outline can be modified as per your requirements):
 
 
 
 Module 1: Security Risk Assessment (Ethical Hacking)
 
 Introduction to Ethical Hacking
 
 What is Hacking
 What is Ethical Hacking
 What is Penetration Testing
 What is Vulnerability Auditing
 Footprinting
 
 What is FootPrinting
 Footprinting Techniques
 Footprinting Website & Tools
 Scanning
 
 What is Network scanning
 Types of Scanners
 Vulnerability Scanner Tools
 Proxy
 
 What is a proxy server
 Types of proxies
 What is a Darkweb
 Why hackers prefer to use Darkweb
 
 
 
 
 Hacking Web Servers & Web Applications
 
 What is a web server
 Types of web attacks
 Session Hijacking
 
 What is session hijacking
 Session hijacking Techniques
 Session hijacking Tools
 Denial of Service
 
 What is a DoS and DDoS attack
 DoS attack techniques
 DoS attack Tools
 System Hacking
 
 What is System Hacking
 What is Password Cracking
 Password Cracking techniques
 Password Cracking Website & Tools
 Sniffers
 
 What is a sniffer
 Sniffing Techniques
 Sniffing Tools
 Phishing
 
 What is Phishing
 Phishing Techniques
 Phishing Tools
 Malware
 
 What is malware
 Types of malware
 Malware creation Tools
 USB password stealers
 Wireless Hacking
 
 Types of wireless networks
 Wireless Hacking Techniques
 Wireless Hacking Tools
 Kali Linux
 
 What is Kali Linux
 Kali Linux Tools
 Module 2: Proactive Defence and Countermeasures
 
 Introduction to Security
 
 What is security?
 Layer 1 Security
 Layer 2 Security
 Layer 3 security
 Firewalls
 
 What is a Firewall?
 Types of firewalls
 Designing Security with Firewalls
 NAT
 Security Policy
 Logs Management
 Application Security
 Content / Web Security
 Authentication
 Virtual Private Networks
 
 What is VPNs
 Type of VPNs
 GRE
 IPSEC
 SSL
 Intrusion Prevention Systems
 
 What is an Intrusion Detection System?
 What is an Intrusion Prevention System?
 High Availability
 
 Virtual / Cloud Devices Security
 
 Host Security
 
 OS Hardening
 Patch management
 Antivirus
 Endpoint Security
 Module 3: Incident Response and Management
 
 SIEM
 
 Introduction to SIEM
 SIEM Architecture
 Events and Logs
 Event Correlation and Event Collection
 Correlation Rules
 Forensic Data
 SIEM Deployment
 Incident Response
 
 Introduction Incident Response
 Incident Response Policy
 Incident Handling
 Forensics of Incident response
 Inside Threat
 Incident Recovery
 Malware Analysis
 Mobile Forensics
 
 Forensic Acquisition of Smartphones
 
 1.         Logical Acquisition
 
 2.        File System Acquisition
 
 3.        Physical Acquisition
 
 Android Forensics
 Retrieving User Activity Information from Android Devices
 iOS (iPhone) Forensics
 Retrieving User Activity Information iOS Devices
 
 
 
 
 Copyright © 2018 Apex Online IT Trainings Inc. All Rights Reserved
 
 
 
 Call us on : USA - +1 214 628 3894 | IND - +91 8500122107
 
 For the course content please follow the link : https://www.apex-online-it-trainings.com/it-trainings-at-apex/cyber-security-online-training
 |  | Website | - |  | Phone | 8500122107 |  |  |  |  |  | 
  
          
|  |   
            |  |  |  |  |  |  |  |  
    | 
 |  |  |  
|  
|  |  |  |  |  |  | | | To increase sales in Hotels and boost your revenue generate ... |  | Others , Montreal |  | 
 | 
 | Send unlimited bulk emails using your own SMTP mail server! ... |  | Services , Toronto |  | 
 | 
 | FOR FREE DEMO contact :
Email : info@ibasetraining.com
Pho... |  | Education , Toronto |  | 
 | 
 | The Job Park: Choose your Career to Prove yourself and Find ... |  | Jobs , Toronto |  | 
 | 
 | 
 |  |  |  |  |  |  |