Login
Categories
Machine Learning
Artificial Intelligence
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
Cyber Security Pristina
Cyber Security
256 Students enrolled
Created by: Blerton Abazi
Last Updated: 15th December 2020
Shqip (Albanian)
Requirements
Cyber Security
Description
Cyber Security
Content
Introduction to Cyber security Course
Introduction to Cyber security Course
Tools and Techniques
Kali Linux - Installation, Configuration and Update
Windows Security Aplication
Windows Cybersecurity in Practice
Access Controls
Cybersecurity Countermeasures
Cybersecurity Countermeasures - continue
Information Gathering
Information Gathering - continue
IG - Tools - Damn Vulnerabilities Web Application
Recon, Scan, Tools in Kali Linux
SNB Analysis
SNMP, SMTP, OSCINT
Exercise
Exercise
Exercise
Introduction to Cyber security Course
Tools and Techniques
Kali Linux - Installation, Configuration and Update
Windows Security Aplication
Windows Cybersecurity in Practice
Access Controls
Cybersecurity Countermeasures
Cybersecurity Countermeasures - continue
Information Gathering
Information Gathering - continue
IG - Tools
Recon, Scan, Tools in Kali Linux
SNB Analysis
SNMP, SMTP, OSCINT
Exercise
Exercise
Exercise
Digital Forensics Tools and Techniques
Digital Forensics Advanced Techniques
Training Conclude - Clarification, Question and Answers
Entrance/Exit Questionnaire
Writen Exam
Practical Exam - Part 1
Practical Exam - Part 2 and Training Wrap-up
Cyber Security Features
Digital deception
Network firewalls, Intrusion Prevention and Threat Intelligence
Social Engineering, Denial of Service and Session Hijacking
Using Kali Linux Advanced Tools
Using Veil Tools for Pennetration
Exaplaning and Using Veil Advanced
Using Shodan for Information Gathering
Advanced OWASP Techniques
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning - Tools and Techniques
Web Application Attacks
Exploiting Web-Based Vulnerabilities
Using Kali Linux Advanced Tools
Exploiting Web-Based Vulnerabilities
SMB Analysis
SEO Security and Identification
OpenStack Security Fundamentals
Wrap-Up Security Tools
Cybersecurity Models, Standards and Application
Introduction to Information Gathering
Information Security Models and Standards
Cybersecurity Maturity Models
Measures to improve Availability
Measuring the level of Security
Security Maturity Models and Integration
IT Trends
IT Trends Workshop
Recent Modules
Web Development Practitioner
Last Updated 15th January 2024
36
Machine Learning
Last Updated 11th January 2024
59
Artificial Intelligence
Last Updated 11th January 2024
75
Python Programming
Last Updated 11th January 2024
159
Big Data Analytics / Data Science
Last Updated 11th January 2024
127
Meet your instructor
Blerton Abazi
Meet your instructor
Report
Become An Instructor
×