Cyber Security real time online training from usa by experts

« Prev

Next »

Cyber Security real time online training from usa by experts


FOR FREE DEMO contact :

Email :

Phone/WhatsApp : +91-(850) 012-2107

USA Number : 214-628-3894

Gtalk :


Cyber Security Interview Questions and Answers, Recorded Video Sessions, Materials, Mock Interviews Assignments Will be provided


(the course outline can be modified as per your requirements):

Module 1: Security Risk Assessment (Ethical Hacking)

Introduction to Ethical Hacking

What is Hacking
What is Ethical Hacking
What is Penetration Testing
What is Vulnerability Auditing

What is FootPrinting
Footprinting Techniques
Footprinting Website & Tools

What is Network scanning
Types of Scanners
Vulnerability Scanner Tools

What is a proxy server
Types of proxies
What is a Darkweb
Why hackers prefer to use Darkweb

Hacking Web Servers & Web Applications

What is a web server
Types of web attacks
Session Hijacking

What is session hijacking
Session hijacking Techniques
Session hijacking Tools
Denial of Service

What is a DoS and DDoS attack
DoS attack techniques
DoS attack Tools
System Hacking

What is System Hacking
What is Password Cracking
Password Cracking techniques
Password Cracking Website & Tools

What is a sniffer
Sniffing Techniques
Sniffing Tools

What is Phishing
Phishing Techniques
Phishing Tools

What is malware
Types of malware
Malware creation Tools
USB password stealers
Wireless Hacking

Types of wireless networks
Wireless Hacking Techniques
Wireless Hacking Tools
Kali Linux

What is Kali Linux
Kali Linux Tools
Module 2: Proactive Defence and Countermeasures

Introduction to Security

What is security?
Layer 1 Security
Layer 2 Security
Layer 3 security

What is a Firewall?
Types of firewalls
Designing Security with Firewalls
Security Policy
Logs Management
Application Security
Content / Web Security
Virtual Private Networks

What is VPNs
Type of VPNs
Intrusion Prevention Systems

What is an Intrusion Detection System?
What is an Intrusion Prevention System?
High Availability

Virtual / Cloud Devices Security

Host Security

OS Hardening
Patch management
Endpoint Security
Module 3: Incident Response and Management


Introduction to SIEM
SIEM Architecture
Events and Logs
Event Correlation and Event Collection
Correlation Rules
Forensic Data
SIEM Deployment
Incident Response

Introduction Incident Response
Incident Response Policy
Incident Handling
Forensics of Incident response
Inside Threat
Incident Recovery
Malware Analysis
Mobile Forensics

Forensic Acquisition of Smartphones

1. Logical Acquisition

2. File System Acquisition

3. Physical Acquisition

Android Forensics
Retrieving User Activity Information from Android Devices
iOS (iPhone) Forensics
Retrieving User Activity Information iOS Devices

Copyright 2018 Apex Online IT Trainings Inc. All Rights Reserved

Call us on : USA - +1 214 628 3894 IND - +91 8500122107

For the course content please follow the link :

General details:

Sold by: sri raja (0 / # 0) Grade sri raja

Ad Details

Ad id: 405186
Ad views:233
Ad expires: 2020.06.07 (in 68 days)
Added: 2020.02.08
Current rating (after 0 votes) Grade

More ads in this category Ads from this seller Contact seller Tell-a-friend Print


We have a total of 177241 users and 7465 ads. There have been 2988654 ad views.