Advertisement Product description:FOR FREE DEMO contact :
Email : raj@apex-online-it-training.com
Phone/WhatsApp : +91-(850) 012-2107
USA Number : 214-628-3894
Gtalk : raavi.sriraja@gmail.com
Blog: https://best-online-it-training-institute.blogspot.com
Cyber Security Interview Questions and Answers, Recorded Video Sessions, Materials, Mock Interviews Assignments Will be provided
CYBER SECURITY COURSE CONTENT
(the course outline can be modified as per your requirements):
Module 1: Security Risk Assessment (Ethical Hacking)
Introduction to Ethical Hacking
What is Hacking What is Ethical Hacking What is Penetration Testing What is Vulnerability Auditing Footprinting
What is FootPrinting Footprinting Techniques Footprinting Website & Tools Scanning
What is Network scanning Types of Scanners Vulnerability Scanner Tools Proxy
What is a proxy server Types of proxies What is a Darkweb Why hackers prefer to use Darkweb
Hacking Web Servers & Web Applications
What is a web server Types of web attacks Session Hijacking
What is session hijacking Session hijacking Techniques Session hijacking Tools Denial of Service
What is a DoS and DDoS attack DoS attack techniques DoS attack Tools System Hacking
What is System Hacking What is Password Cracking Password Cracking techniques Password Cracking Website & Tools Sniffers
What is a sniffer Sniffing Techniques Sniffing Tools Phishing
What is Phishing Phishing Techniques Phishing Tools Malware
What is malware Types of malware Malware creation Tools USB password stealers Wireless Hacking
Types of wireless networks Wireless Hacking Techniques Wireless Hacking Tools Kali Linux
What is Kali Linux Kali Linux Tools Module 2: Proactive Defence and Countermeasures
Introduction to Security
What is security? Layer 1 Security Layer 2 Security Layer 3 security Firewalls
What is a Firewall? Types of firewalls Designing Security with Firewalls NAT Security Policy Logs Management Application Security Content / Web Security Authentication Virtual Private Networks
What is VPNs Type of VPNs GRE IPSEC SSL Intrusion Prevention Systems
What is an Intrusion Detection System? What is an Intrusion Prevention System? High Availability
Virtual / Cloud Devices Security
Host Security
OS Hardening Patch management Antivirus Endpoint Security Module 3: Incident Response and Management
SIEM
Introduction to SIEM SIEM Architecture Events and Logs Event Correlation and Event Collection Correlation Rules Forensic Data SIEM Deployment Incident Response
Introduction Incident Response Incident Response Policy Incident Handling Forensics of Incident response Inside Threat Incident Recovery Malware Analysis Mobile Forensics
Forensic Acquisition of Smartphones
1. Logical Acquisition
2. File System Acquisition
3. Physical Acquisition
Android Forensics Retrieving User Activity Information from Android Devices iOS (iPhone) Forensics Retrieving User Activity Information iOS Devices
Copyright © 2018 Apex Online IT Trainings Inc. All Rights Reserved
Call us on : USA - +1 214 628 3894 | IND - +91 8500122107
For the course content please follow the link : https://www.apex-online-it-trainings.com/it-trainings-at-apex/cyber-security-online-training | Website | - | Phone | 8500122107 | | | | |
|
|
|
|
|
|
|
|
|
|
To increase sales in Hotels and boost your revenue generate ... | Others , Montreal |
|
Send unlimited bulk emails using your own SMTP mail server! ... | Services , Toronto |
|
FOR FREE DEMO contact :
Email : info@ibasetraining.com
Pho... | Education , Toronto |
|
The Job Park: Choose your Career to Prove yourself and Find ... | Jobs , Toronto |
|
|
|
|
|
|
|