Cyber Security real time online training from usa by experts

« Prev

Next »

Cyber Security real time online training from usa by experts

Description:

FOR FREE DEMO contact :

Email : raj@apex-online-it-training.com

Phone/WhatsApp : +91-(850) 012-2107

USA Number : 214-628-3894

Gtalk : raavi.sriraja@gmail.com

Blog: https://best-online-it-training-institute.blogspot.com



Cyber Security Interview Questions and Answers, Recorded Video Sessions, Materials, Mock Interviews Assignments Will be provided


CYBER SECURITY COURSE CONTENT

(the course outline can be modified as per your requirements):



Module 1: Security Risk Assessment (Ethical Hacking)

Introduction to Ethical Hacking

What is Hacking
What is Ethical Hacking
What is Penetration Testing
What is Vulnerability Auditing
Footprinting

What is FootPrinting
Footprinting Techniques
Footprinting Website & Tools
Scanning

What is Network scanning
Types of Scanners
Vulnerability Scanner Tools
Proxy

What is a proxy server
Types of proxies
What is a Darkweb
Why hackers prefer to use Darkweb




Hacking Web Servers & Web Applications

What is a web server
Types of web attacks
Session Hijacking

What is session hijacking
Session hijacking Techniques
Session hijacking Tools
Denial of Service

What is a DoS and DDoS attack
DoS attack techniques
DoS attack Tools
System Hacking

What is System Hacking
What is Password Cracking
Password Cracking techniques
Password Cracking Website & Tools
Sniffers

What is a sniffer
Sniffing Techniques
Sniffing Tools
Phishing

What is Phishing
Phishing Techniques
Phishing Tools
Malware

What is malware
Types of malware
Malware creation Tools
USB password stealers
Wireless Hacking

Types of wireless networks
Wireless Hacking Techniques
Wireless Hacking Tools
Kali Linux

What is Kali Linux
Kali Linux Tools
Module 2: Proactive Defence and Countermeasures

Introduction to Security

What is security?
Layer 1 Security
Layer 2 Security
Layer 3 security
Firewalls

What is a Firewall?
Types of firewalls
Designing Security with Firewalls
NAT
Security Policy
Logs Management
Application Security
Content / Web Security
Authentication
Virtual Private Networks

What is VPNs
Type of VPNs
GRE
IPSEC
SSL
Intrusion Prevention Systems

What is an Intrusion Detection System?
What is an Intrusion Prevention System?
High Availability

Virtual / Cloud Devices Security

Host Security

OS Hardening
Patch management
Antivirus
Endpoint Security
Module 3: Incident Response and Management

SIEM

Introduction to SIEM
SIEM Architecture
Events and Logs
Event Correlation and Event Collection
Correlation Rules
Forensic Data
SIEM Deployment
Incident Response

Introduction Incident Response
Incident Response Policy
Incident Handling
Forensics of Incident response
Inside Threat
Incident Recovery
Malware Analysis
Mobile Forensics

Forensic Acquisition of Smartphones

1. Logical Acquisition

2. File System Acquisition

3. Physical Acquisition

Android Forensics
Retrieving User Activity Information from Android Devices
iOS (iPhone) Forensics
Retrieving User Activity Information iOS Devices




Copyright 2018 Apex Online IT Trainings Inc. All Rights Reserved



Call us on : USA - +1 214 628 3894 IND - +91 8500122107

For the course content please follow the link : https://www.apex-online-it-trainings.com/it-trainings-at-apex/cyber-security-online-training

General details:

Sold by: sri raja (0 / # 0) Grade sri raja
Email: apexitonlinetrainings@gmail.com

Ad Details

Ad id: 405186
Ad views:233
Ad expires: 2020.06.07 (in 68 days)
Added: 2020.02.08
Current rating (after 0 votes) Grade




More ads in this category Ads from this seller Contact seller Tell-a-friend Print

Search
   

We have a total of 177241 users and 7465 ads. There have been 2988654 ad views.