cyber security real time online training from usa by experts
Posted: Saturday February 08
for free demo contact :
email : raj@apex-online-it-training.com
phone/whatsapp : +91-(850) 012-2107
usa number : 214-628-3894
gtalk : raavi.sriraja
blog: https://best-online-it-training-institute.blogspot.com
cyber security interview questions and answers, recorded video sessions, materials, mock interviews assignments will be provided
cyber security course content
(the course outline can be modified as per your requirements):
module 1: security risk assessment (ethical hacking)
introduction to ethical hacking
what is hacking
what is ethical hacking
what is penetration testing
what is vulnerability auditing
footprinting
what is footprinting
footprinting techniques
footprinting website & tools
scanning
what is network scanning
types of scanners
vulnerability scanner tools
proxy
what is a proxy server
types of proxies
what is a darkweb
why hackers prefer to use darkweb
hacking web servers & web applications
what is a web server
types of web attacks
session hijacking
what is session hijacking
session hijacking techniques
session hijacking tools
denial of service
what is a dos and ddos attack
dos attack techniques
dos attack tools
system hacking
what is system hacking
what is password cracking
password cracking techniques
password cracking website & tools
sniffers
what is a sniffer
sniffing techniques
sniffing tools
phishing
what is phishing
phishing techniques
phishing tools
malware
what is malware
types of malware
malware creation tools
usb password stealers
wireless hacking
types of wireless networks
wireless hacking techniques
wireless hacking tools
kali linux
what is kali linux
kali linux tools
module 2: proactive defence and countermeasures
introduction to security
what is security?
layer 1 security
layer 2 security
layer 3 security
firewalls
what is a firewall?
types of firewalls
designing security with firewalls
nat
security policy
logs management
application security
content / web security
authentication
virtual private networks
what is vpns
type of vpns
gre
ipsec
ssl
intrusion prevention systems
what is an intrusion detection system?
what is an intrusion prevention system?
high availability
virtual / cloud devices security
host security
os hardening
patch management
antivirus
endpoint security
module 3: incident response and management
siem
introduction to siem
siem architecture
events and logs
event correlation and event collection
correlation rules
forensic data
siem deployment
incident response
introduction incident response
incident response policy
incident handling
forensics of incident response
inside threat
incident recovery
malware analysis
mobile forensics
forensic acquisition of smartphones
1. logical acquisition
2. file system acquisition
3. physical acquisition
android forensics
retrieving user activity information from android devices
ios (iphone) forensics
retrieving user activity information ios devices
copyright © 2018 apex online it trainings inc. all rights reserved
call us on : usa - +1 214 628 3894 | ind - +91 8500122107
for the course content please follow the link : https://www.apex-online-it-trainings.com/it-trainings-at-apex/cyber-security-online-training
email : raj@apex-online-it-training.com
phone/whatsapp : +91-(850) 012-2107
usa number : 214-628-3894
gtalk : raavi.sriraja
blog: https://best-online-it-training-institute.blogspot.com
cyber security interview questions and answers, recorded video sessions, materials, mock interviews assignments will be provided
cyber security course content
(the course outline can be modified as per your requirements):
module 1: security risk assessment (ethical hacking)
introduction to ethical hacking
what is hacking
what is ethical hacking
what is penetration testing
what is vulnerability auditing
footprinting
what is footprinting
footprinting techniques
footprinting website & tools
scanning
what is network scanning
types of scanners
vulnerability scanner tools
proxy
what is a proxy server
types of proxies
what is a darkweb
why hackers prefer to use darkweb
hacking web servers & web applications
what is a web server
types of web attacks
session hijacking
what is session hijacking
session hijacking techniques
session hijacking tools
denial of service
what is a dos and ddos attack
dos attack techniques
dos attack tools
system hacking
what is system hacking
what is password cracking
password cracking techniques
password cracking website & tools
sniffers
what is a sniffer
sniffing techniques
sniffing tools
phishing
what is phishing
phishing techniques
phishing tools
malware
what is malware
types of malware
malware creation tools
usb password stealers
wireless hacking
types of wireless networks
wireless hacking techniques
wireless hacking tools
kali linux
what is kali linux
kali linux tools
module 2: proactive defence and countermeasures
introduction to security
what is security?
layer 1 security
layer 2 security
layer 3 security
firewalls
what is a firewall?
types of firewalls
designing security with firewalls
nat
security policy
logs management
application security
content / web security
authentication
virtual private networks
what is vpns
type of vpns
gre
ipsec
ssl
intrusion prevention systems
what is an intrusion detection system?
what is an intrusion prevention system?
high availability
virtual / cloud devices security
host security
os hardening
patch management
antivirus
endpoint security
module 3: incident response and management
siem
introduction to siem
siem architecture
events and logs
event correlation and event collection
correlation rules
forensic data
siem deployment
incident response
introduction incident response
incident response policy
incident handling
forensics of incident response
inside threat
incident recovery
malware analysis
mobile forensics
forensic acquisition of smartphones
1. logical acquisition
2. file system acquisition
3. physical acquisition
android forensics
retrieving user activity information from android devices
ios (iphone) forensics
retrieving user activity information ios devices
copyright © 2018 apex online it trainings inc. all rights reserved
call us on : usa - +1 214 628 3894 | ind - +91 8500122107
for the course content please follow the link : https://www.apex-online-it-trainings.com/it-trainings-at-apex/cyber-security-online-training
• Location: bangalore
• Post ID: 189108

