- United Arab Emirates
- Saudi Arabia
- Qatar
- Oman
- Kuwait
- Bahrain
- Pakistan
- Egypt
- Libya
- Afghanistan
- Sudan
- Cyprus
- Fiji
- Ethiopia
- Ghana
- Kenya
- Nigeria
- Mauritius
- South Africa
- Zambia
- Zimbabwe
- Mozambique
- Uganda
- Tanzania
- Angola
- And Growing up
Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)
In this course, you will learn about security risk management as a core concept that affects public and private organizations from all around the world in protecting assets, people and information. An integral part of this process includes security testing and analysis both internal to an organization using internal personnel or external to an organization using outside resources ( i.e . penetration testers). Learn the common security testing methodology and utilize associated tools commonly used by cybersecurity professionals across various environments such as apps, networks, IoT devices and much more for hands-on practice.
Module 1: Key issues plaguing the information security world and information security laws and standards.
Module 2: Fundamentals of ethical hacking.
Module 3: Information security threats and vulnerabilities.
Module 4: Different types of malware.
Module 5: Different types of password cracking techniques and countermeasures.
Module 6: Social engineering techniques, insider threats, identity theft, and countermeasures.
Module 7: Network level attacks (sniffing, denial of service, and session hijacking) and countermeasures.
Module 8: Application level attacks (web server attacks, web application.
attacks, and SQL injection) and countermeasures.
Module 9: Wireless encryption, wireless threats, and countermeasures.
Module 10: Mobile platform attack vector, mobile device management,
mobile security guidelines, and security tools.
Module 11: IoT and OT concepts, attacks, and countermeasures.
Module 12: Cloud computing technologies, cloud computing threats, attacks,
and security techniques.
Module 13: Fundamentals of pen testing.
Audience Profile
This course is intended for IT professionals, Cyber Enthusiasts & Career Starters.
Live, Online Training by top Instructors and practitioners across the globe.
Conduct training at the work location you desired.
The Venue will be ideally located and easy to access with covid-19 SOP's.
Travel to any desired location for your training.