Login
Categories
Machine Learning
Artificial Intelligence
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
Cyber Security Practitioner 1
Cyber Security Practitioner 1
225 Students enrolled
Created by: Blerton Abazi, Fiona Spanca
Last Updated: 2nd November 2021
Shqip (Albanian)
Requirements
Cyber Security Practitioner 1
Description
Cyber Security Practitioner 1
Content
Introduction to Cybersecurity
Introduction to Cyberseurity
InfoSec vs CyberSec - Threat Actors
Exercise - Installation of the Tools
Infrastructure Security and Configuration Management
State of the Data
Exercise 1 - State of Data
SQL Injection
The Cyber Kill Chain Model
Exercise - Wireshark
Exercise - Information Gathering - Tool - Kali Linux
Exercise - SQL Injection. SSL certificate analyser
Exercise - DVWA, theHarvester
Exercise - dnsrecon, dnsenum
Introduction to Cyberseurity
InfoSec vs CyberSec - Threat Actors
Exercise - Installation of the Tools
Infrastructure Security and Configuration Management
State of the Data
Exercise 1 - State of Data
SQL Injection
The Cyber Kill Chain Model
Introduction to Cyberseurity
InfoSec vs CyberSec - Threat Actors
Exercise - Wireshark
Exercise - Installation of the Tools
Infrastructure Security and Configuration Management
State of the Data
Exercise 1 - State of Data
Exercise - Information Gathering - Tool - Kali Linux
SQL Injection
The Cyber Kill Chain Model
Exercise - SQL Injection. SSL certificate analyser
Exercise - Wireshark
Introduction to Cyberseurity
InfoSec vs CyberSec - Threat Actors
Introduction to Cyberseurity
Introduction to Cyberseurity
Exercise - Installation of the Tools
InfoSec vs CyberSec - Threat Actors
Exercise - Information Gathering - Tool - Kali Linux
InfoSec vs CyberSec - Threat Actors
Infrastructure Security and Configuration Management
Exercise - Installation of the Tools
Exercise - Installation of the Tools
Infrastructure Security and Configuration Management
State of the Data
Infrastructure Security and Configuration Management
Exercise - SQL Injection. SSL certificate analyser
State of the Data
Exercise 1 - State of Data
State of the Data
Exercise 1 - State of Data
Exercise 1 - State of Data
SQL Injection
SQL Injection
The Cyber Kill Chain Model
SQL Injection
The Cyber Kill Chain Model
The Cyber Kill Chain Model
Exercise - Wireshark
Exercise - DVWA, theHarvester
Exercise - Wireshark
Exercise - Wireshark
Exercise - dnsrecon, dnsenum
Exercise - Information Gathering - Tool - Kali Linux
Exercise - Information Gathering - Tool - Kali Linux
Exercise - Information Gathering - Tool - Kali Linux
Exercise - SQL Injection. SSL certificate analyser
Exercise - DVWA, theHarvester
Exercise - SQL Injection. SSL certificate analyser
Introduction to Cyberseurity
Exercise - SQL Injection. SSL certificate analyser
InfoSec vs CyberSec - Threat Actors
Exercise - dnsrecon, dnsenum
Exercise - Installation of the Tools
Infrastructure Security and Configuration Management
State of the Data
Exercise 1 - State of Data
SQL Injection
The Cyber Kill Chain Model
Exercise - Wireshark
Exercise - DVWA, theHarvester
Exercise - DVWA, theHarvester
Exercise - DVWA, theHarvester
Exercise - dnsrecon, dnsenum
Exercise - dnsrecon, dnsenum
Introduction to Cyberseurity
Exercise - Information Gathering - Tool - Kali Linux
Exercise - dnsrecon, dnsenum
InfoSec vs CyberSec - Threat Actors
Exercise - Installation of the Tools
Exercise - SQL Injection. SSL certificate analyser
Infrastructure Security and Configuration Management
State of the Data
Exercise 1 - State of Data
SQL Injection
The Cyber Kill Chain Model
Exercise - Wireshark
Exercise - Information Gathering - Tool - Kali Linux
Exercise - DVWA, theHarvester
Exercise - SQL Injection. SSL certificate analyser
Exercise - dnsrecon, dnsenum
Exercise - DVWA, theHarvester
Exercise - dnsrecon, dnsenum
Material Wrap-Up
Introduction to Big Data
Practical Approach to Cybersecurity
Information Gathering
Information Gathering - Practicing Examples
ISO 27001 - Information Security Procedure
Network Profiling
Server Profiling
Exercise - SQL Injection
Cryptography
Vulnerabilities & Configuration, identity & authentication testing
Malware Analysis
Application of Malware Analysis Tools
DVWA - Web Vulnerability Analysis
SQL Injection by DVWA
Information Gathering
Information Gathering - Practicing Examples
ISO 27001 - Information Security Procedure
Network Profiling
Information Gathering
Server Profiling
Information Gathering - Practicing Examples
Exercise - SQL Injection
Cryptography
ISO 27001 - Information Security Procedure
Vulnerabilities & Configuration, identity & authentication testing
Network Profiling
Malware Analysis
Server Profiling
Application of Malware Analysis Tools
Exercise - SQL Injection
DVWA - Web Vulnerability Analysis
Cryptography
Information Gathering
SQL Injection by DVWA
Vulnerabilities & Configuration, identity & authentication testing
Information Gathering
Information Gathering - Practicing Examples
Information Gathering
Malware Analysis
Information Gathering - Practicing Examples
Information Gathering - Practicing Examples
Application of Malware Analysis Tools
ISO 27001 - Information Security Procedure
DVWA - Web Vulnerability Analysis
ISO 27001 - Information Security Procedure
ISO 27001 - Information Security Procedure
Network Profiling
SQL Injection by DVWA
Network Profiling
Network Profiling
Server Profiling
Server Profiling
Server Profiling
Exercise - SQL Injection
Exercise - SQL Injection
Exercise - SQL Injection
Cryptography
Cryptography
Cryptography
Vulnerabilities & Configuration, identity & authentication testing
Vulnerabilities & Configuration, identity & authentication testing
Vulnerabilities & Configuration, identity & authentication testing
Malware Analysis
Malware Analysis
Application of Malware Analysis Tools
Malware Analysis
Application of Malware Analysis Tools
DVWA - Web Vulnerability Analysis
DVWA - Web Vulnerability Analysis
Application of Malware Analysis Tools
DVWA - Web Vulnerability Analysis
Information Gathering
SQL Injection by DVWA
SQL Injection by DVWA
Information Gathering - Practicing Examples
SQL Injection by DVWA
ISO 27001 - Information Security Procedure
Network Profiling
Server Profiling
Exercise - SQL Injection
Cryptography
Vulnerabilities & Configuration, identity & authentication testing
Malware Analysis
Information Gathering
Application of Malware Analysis Tools
Information Gathering - Practicing Examples
DVWA - Web Vulnerability Analysis
ISO 27001 - Information Security Procedure
SQL Injection by DVWA
Network Profiling
Server Profiling
Exercise - SQL Injection
Cryptography
Vulnerabilities & Configuration, identity & authentication testing
Malware Analysis
Application of Malware Analysis Tools
DVWA - Web Vulnerability Analysis
SQL Injection by DVWA
Brute Force Attack with DVWA
Exercise - Social Engineering Tools
Working with different Security Social Engineering Tools
Exploatation
Exercise - Veil
Kali Liux Tools - PRactice, Wevee, Autospy
Security Activity - Threat Modeling System
Exercise - wpscan, whatweb, dirb, recon-ng
Cyber-defense - Techniques
Cyber-defense - Techniques - continuation
Cybersecurity Defense
Cybersecurity Wrap-Up
Practice Tool Wrap-Up
Recent Modules
Web Development Practitioner
Last Updated 15th January 2024
36
Machine Learning
Last Updated 11th January 2024
59
Artificial Intelligence
Last Updated 11th January 2024
75
Python Programming
Last Updated 11th January 2024
159
Big Data Analytics / Data Science
Last Updated 11th January 2024
127
Meet your instructor
Blerton Abazi
Meet your instructor
Fiona Spanca
Meet your instructor
Report
Become An Instructor
×