Login
Categories
Machine Learning
Machine Learning
Artificial Intelligence
Big Data Analytics & Cloud Computing
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
Cyber Security Practitioner 2
Cyber Security Practitioner 2
175 Students enrolled
Created by: Fiona Spanca, Blerton Abazi
Last Updated: 2nd November 2021
English
Requirements
Cyber Security Practitioner 2
Description
Cyber Security Practitioner 2
Content
Introduction to Cyber Security
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Cybersecurity Contermeasures
Cyber Toolkits
Kali Linux Virtualizations and Installations and Procedures
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Cybersecurity Contermeasures
Cyber Toolkits
Kali Linux Virtualizations and Installations and Procedures
Exercise - Maltego, theHarvester
Cryptography
Exercise - Veil
Exercise - Social Engineering Tools
Cybersecurity Fundamentals
Windows Security Fundamentals
Windows Security Suite Tools
Vulnerability Assessment
Exercise - Wireshark
Exercise - wpscan, whatweb, dirb, recon-ng
Exercise - Class Activtiy 1
Exercise - Solutions of Class Activity 1
Introduction to Cyber Forensics
Exercise - Class Activity 2
Exercise - Solutions of Class Activity 2
Practical Approach to Cybersecurity
Applying metadata to security
Using Legion to Cyberoperations
Data Gathering and Reconnaissance
Practical Tools to Cyber forensics
SEO Toolkit
Reverse Engineering Tools
Reverse Engineering Methods
Weaponization as part of the Cyber Kill Chain
The application of Reverse Engineering
PDLC - ISO 27001 Cycle
Disaster Recovery Plans on Cybersecurity
Recent Modules
Cybersecurity Professional
Last Updated 25th February 2025
29
Machine Learning
Last Updated 24th February 2025
52
Artificial Intelligence
Last Updated 24th February 2025
50
Python Programming
Last Updated 24th February 2025
142
Big Data Analytics / Cloud Computin...
Last Updated 24th February 2025
101
Meet your instructor
Fiona Spanca
Meet your instructor
Blerton Abazi
Meet your instructor
Report
Become An Instructor
×