In this course, you will learn about security risk management as a core concept that affects public and private organizations from all around the world in protecting assets, people and information. An integral part of this process includes security testing and analysis both internal to an organization using internal personnel or external to an organization using outside resources ( i.e . penetration testers). Learn the common security testing methodology and utilize associated tools commonly used by cybersecurity professionals across various environments such as apps, networks, IoT devices and much more for hands-on practice.
Module 1: Key issues plaguing the information security world and information security laws and standards.
Module 2: Fundamentals of ethical hacking.
Module 3: Information security threats and vulnerabilities.
Module 4: Different types of malware.
Module 5: Different types of password cracking techniques and countermeasures.
Module 6: Social engineering techniques, insider threats, identity theft, and countermeasures.
Module 7: Network level attacks (sniffing, denial of service, and session hijacking) and countermeasures.
Module 8: Application level attacks (web server attacks, web application.
attacks, and SQL injection) and countermeasures.
Module 9: Wireless encryption, wireless threats, and countermeasures.
Module 10: Mobile platform attack vector, mobile device management,
mobile security guidelines, and security tools.
Module 11: IoT and OT concepts, attacks, and countermeasures.
Module 12: Cloud computing technologies, cloud computing threats, attacks,
and security techniques.
Module 13: Fundamentals of pen testing.
This course is intended for IT professionals, Cyber Enthusiasts & Career Starters.