The Absolute Beginners Guide to Cyber Security Part 3 - Druckversion +- Forum Rockoldies (https://rockoldies.net/forum) +-- Forum: Fotobearbeitung - Photoshop (https://rockoldies.net/forum/forumdisplay.php?fid=16) +--- Forum: E-Learning, Tutorials (https://rockoldies.net/forum/forumdisplay.php?fid=18) +--- Thema: The Absolute Beginners Guide to Cyber Security Part 3 (/showthread.php?tid=19323) |
The Absolute Beginners Guide to Cyber Security Part 3 - Panter - 01.02.2021 The Absolute Beginners Guide to Cyber Security Part 3 Video: .mp4 (1280x720, 30 fps®) | Audio: aac, 48000 Hz, 2ch | Size: 907 MB Genre: eLearning Video | Duration: 5 lectures (2h 6m) | Language: English Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques What you'll learn You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4. You will feel confident and comfortable with cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions. You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. You will be able to explain on your own the types of ransomwares, how crypto ransomware works and will go through a real world example of a ransomware attack on the Bristol Airport Screens. You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. You can give insightful talks on zero-day exploit, malware and its types, man in the middle (mitm) attack and can get conversant with web application security. Requirements You should have completed three previous courses, this course is a continuation of the previous courses: a) The Absolute Beginners Guide to Cyber Security and Hacking b)The Absolute Beginners Guide to Cyber Security Part 1 c)The Absolute Beginners Guide to Hacking Part 2 Description Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions. Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens. Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security. Who this course is for: Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required. |