Themabewertung:
  • 0 Bewertung(en) - 0 im Durchschnitt
  • 1
  • 2
  • 3
  • 4
  • 5
The Absolute Beginners Guide to Cyber Security Part 3
#1
[Bild: 0072076a4qj4a.jpg]

The Absolute Beginners Guide to Cyber Security Part 3
Video: .mp4 (1280x720, 30 fps®) | Audio: aac, 48000 Hz, 2ch | Size: 907 MB
Genre: eLearning Video | Duration: 5 lectures (2h 6m) | Language: English

Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques




What you'll learn

You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
You will feel confident and comfortable with cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
You will be able to explain on your own the types of ransomwares, how crypto ransomware works and will go through a real world example of a ransomware attack on the Bristol Airport Screens.
You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
You can give insightful talks on zero-day exploit, malware and its types, man in the middle (mitm) attack and can get conversant with web application security.

Requirements

You should have completed three previous courses, this course is a continuation of the previous courses: a) The Absolute Beginners Guide to Cyber Security and Hacking b)The Absolute Beginners Guide to Cyber Security Part 1 c)The Absolute Beginners Guide to Hacking Part 2


Description

Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.

Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.

Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.


Who this course is for:

Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain
This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

[Bild: 0072076bpykpa.jpeg]

Zitieren


Möglicherweise verwandte Themen…
Thema Verfasser Antworten Ansichten Letzter Beitrag
  Fast Python Programming For Absolute Beginners SQL in Python Panter 0 109 03.02.2024, 12:22
Letzter Beitrag: Panter
  Blender to Unreal Engine 5 The Complete Beginners Guide Panter 0 87 02.01.2024, 23:35
Letzter Beitrag: Panter
  Complete Guide to Zbrush 2023 for Beginners Panter 0 101 31.12.2023, 01:10
Letzter Beitrag: Panter
  Pendulum Dowsing: A Definitive Guide For Beginners Panter 0 106 24.07.2023, 23:02
Letzter Beitrag: Panter
  Part 3 FAA Private Pilot Ground School (Part 61) Panter 0 103 13.07.2023, 02:07
Letzter Beitrag: Panter
  Complete Blender Guide for Beginners & Intermediate Panter 0 108 17.06.2023, 09:07
Letzter Beitrag: Panter

Gehe zu:


Benutzer, die gerade dieses Thema anschauen: 1 Gast/Gäste
Expand chat