Programming
The Absolute Beginners Guide to Cyber Security Part 3
Category
ethical-hacking
Show Count
648
Redirect Count
531
The Absolute Beginners Guide to Cyber Security Part 3
Share :
Publisher : Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Price : $54
Course Language : English
Description
Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.
Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.
ethical-hacking
Show Count
648
Redirect Count
531
The Absolute Beginners Guide to Cyber Security Part 3
Share :
Publisher : Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Price : $54
Course Language : English
Description
Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.
Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.
Post a Comment
0 Comments