Cyber Security Advance

Cyber Security Advance 

◀️ للتسجيل (إضغط هنا)
◀️ للاستفسار واتس 0096899717273

 

No Course
Module 1 Security Awareness – Linux

Networking refresher – Cyberaware

Labs Practice – Case Studies
Module 2 Ethical Hacking & Penetration Testing

Essentials – CPTA

Labs Practice – Case Studies
Module 3 Network Infrastructure Penetration Testing

and Ethical Hacking – CPT

Labs Practice – Case Studies
Module 4 Web Application Penetration Testing and

Ethical Hacking – CWPT

Labs Practice – Case Studies
Module 5 Digital Forensics, Incident Response, and

Threat Hunting – CDFE

Labs Practice – Case Studies
Module 6 Wireless Penetration Testing -CWSP
Labs Practice – Case Studies

Outline:

Security awareness

  • Security Awareness in operating systems
  • password management
  • viruses and malware
  • mobile data
  • physical security
  • social engineering
  • phishers
  • acceptable use policies,
  • incident response
  • security services
  • risk management
  • network eavesdropping
  • encryption
  • backups
  • protecting your computer
  • identity theft
  • privacy and legal issues

 

Ethical Hacking and Penetration Testing essential

  • Vulnerability Assessment
  • Packet Analysis
  • Penetration Testing
  • System Hardening
  • Malware Analysis

 

Network infrastructure Penetration Testing and Ethical Hacking

  • Comprehensive Pen Test Planning, Scoping, and Recon
  • In-Depth Scanning
  • Exploitation
  • Post-Exploitation and Merciless Pivoting
  • In-Depth Password Attacks and Web App Pen Testing
  • Penetration Test & Capture-the-Flag Challenge

 

Web applications Penetration Testing and Ethical Hacking

  • Advanced Attacks
  • Web Frameworks
  • Web Cryptography
  • Alternative Web Interfaces
  • Web Application Firewall and Filter Bypass
  • Capture the Flag

 

Advanced Digital Forensics, Incident Response, and Threat Hunting

  • Advanced Incident Response & Threat Hunting
  • Memory Forensics in Incident Response & Threat Hunting
  • Intrusion Forensics
  • Timeline Analysis
  • Incident Response & Hunting Across the Enterprise
  • Advanced Adversary & Anti-Forensics Detection
  • Digital Forensics for Linux

 

Wireless Penetration Testing and Ethical Hacking

  • WiFi Data Collection and Analysis
  • WiFi Attack and Exploitation Techniques
  • Enterprise WiFi, DECT, and ZigBee Attacks
  • Bluetooth and Software Defined Radio Attacks
  • RFID, Smart Cards, and NFC Hacking
  • Hands-on Capture-the-Flag Event
Print Friendly, PDF & Email

إبحث حسب التخصص