Course curriculum

    1. Instructor LED

    2. Overview

    3. What is Information Security?

    4. Need for Security

    5. Elements of Information Security

    6. The Security, Functionality, and Usability Triangle

    7. Security Challenges

    8. Motives, Goals, and Objectives of Information Security Attacks

    9. Information Security Attack Vectors

    10. All info

    1. Overview

    2. Cyber Kill Chain Methodology

    3. Tactics, Techniques, and Procedures (TTPs)

    4. Indicators of Compromise (IoCs)

    5. Categories of Indicators of Compromise

    1. What is Hacking?

    2. Who is a Hacker?

    3. Hacker Classes/Threat Actors

    4. Understand Different Phases of Hacking Cycle

    5. Why Ethical Hacking is Necessary

    6. Hacking Techniques & Guide

    7. Instructor LED

    1. Instructor LED

    2. Overview

    3. Module Flow

    4. Define Threat and Threat Sources

    5. What is a Threat?

    6. Examples of Threats

    7. Threat Sources

    8. Module Flow

    9. Define Malware and its Types

    10. Introduction to Malware

    11. Different Ways for Malware to Enter a System

    12. Common Techniques Attackers Use to Distribute Malware on the Web

    13. Components of Malware

    14. Module Flow

    15. Types of Malware

    16. Malware Countermeasures

    17. Moudle Flow

    18. Define Vulnerabilities

    19. What is Vulnerability?

    20. Vulnerability Classification

    21. Impact of Vulnerabilities

    22. Module Flow

    23. Define Vulnerability Assessment

    24. Vulnerability Research

    25. What is Vulnerability Assessment?

    26. Vulnerability-Management Life Cycle

    27. Vulnerability Exploitation

    28. Module Summary

    1. Instructor LED

    2. Overview

    3. Password Cracking

    4. Password Complexity

    5. Types of Password Attacks

    6. Dictionary, Brute-Force, and Rule-based Attack

    7. Password Guessing

    8. Default Passwords

    9. Trojans/Spyware/Keyloggers

    10. Pass the Ticket Attack

    11. Wire Sniffing

    12. Man-in-the-Middle and Replay Attacks

    13. Rainbow Table Attack

    14. Password Cracking Tools

    15. Discuss Password Cracking Countermeasures

    1. INSTRUCTOR LED

    2. Overview

    3. Module Flow

    4. What is Social Engineering?

    5. Common Targets of Social Engineering

    6. Impact of Social Engineering Attack on an Organization

    7. Factors that Make Companies Vulnerable to Attacks

    8. Types of Social Engineering

    9. Phishing

    10. Phishing Tools

    11. Fake Security Applications

    12. Social Engineering Countermeasures

    13. How to Detect Phishing Emails

    14. Social Engineering Tools

About this course

  • $399.00
  • 214 lessons
  • 15 hours of video content

Discover your potential, starting today