Login
Categories
Machine Learning
Machine Learning
Artificial Intelligence
Big Data Analytics & Cloud Computing
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
S2 Cyber Security Online (Group 2)
Cyber Security Online (Group 2)
478 Students enrolled
Created by: Dugagjin Sahatqija
Last Updated: 16th March 2021
Shqip (Albanian)
Requirements
Cyber Security Online (Group 2)
Description
Cyber Security Online (Group 2)
Content
Basics
The Cybersecurity cube
CIA triad, States of the data
States of the data
Infrastructure security
Malware and malicious code
Lab exercises
Quiz 1 & review
Practice hours - Linux shell
Trickery and attacks
Malware, trickery and attacks, practice
Lab Activity
Data collection
Ethical hacking, lab practice
Defending Systems and Devices and digital deception
Footprinting and reconnaissance
Practice: reconnaissance with nmap
Defending Systems and devices
SQL Injection
Practice: nmap and SQL injection
Network Firewalls
Measures to improve availability
Vulnerability scanning with Nessus
Quiz 3 review and practice
Introduction to Information Gathering
Advanced
Vulnerabilities & configuration, OpenVAS
Penetration tools
Disaster recovery
Penetration tools - practical tools
Cryptography, symmetric and asymmetric encryption
Cloud Security
Endpoint Security Analysis
Endpoint Security Assessment
Identity and Authentication Testing
Data Integrity and Controls
Offensive Security
Offensive Security and Penetration testing - lab
Data Integrity Enforcement
Offensive Security and Penetration Testing – Lab
Forenzics
Forenzics Lab
Introduction to OWASP - Open Web Application Security Project
Securing Web Applications
Intrusion Data Analysis
Data Collection, Preparation and Analysis
Developing Cyber Security Policies
LAB Practice work
Developing a Cyber Security and Risk Mitigation Plan
Analyzing Malicious Activity in Memory Using Volatility
LAB Practice Work and exit test
LAB Practice work
Middle level
Information Security Models and Standards
Cybersecurity Maturity Models
Incident response
Recent Modules
Web Development Practitioner
Last Updated 16th September 2024
0
Machine Learning
Last Updated 16th September 2024
47
Artificial Intelligence
Last Updated 16th September 2024
47
Python Programming
Last Updated 17th September 2024
198
Big Data Analytics / Cloud Computin...
Last Updated 16th September 2024
153
Meet your instructor
Dugagjin Sahatqija
Meet your instructor
Report
Become An Instructor
×