Login
Categories
Machine Learning
Artificial Intelligence
Software Development
Web Application Development
Java Development
Python
Cyber Security
Cyber Security
Soft Skills
Soft Skills Development
IT Project Management
Web Application Development
Web Application Development
Big Data Analytics / Data Science
Bid Data Analytics / Data Science
Kosovo Young ICT Skilled Profiles
Login
Become An Instructor
×
Cyber Security Practitioner 2
Cyber Security Practitioner 2
175 Students enrolled
Created by: Fiona Spanca, Blerton Abazi
Last Updated: 2nd November 2021
English
Requirements
Cyber Security Practitioner 2
Description
Cyber Security Practitioner 2
Content
Introduction to Cyber Security
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Cybersecurity Contermeasures
Cyber Toolkits
Kali Linux Virtualizations and Installations and Procedures
Introduction to Cyberseurity
Essentials of Cybersecurity
Installation of the Tools
Vulnerabilities & Configuration, identity & authentication testing
Data Security
State of the Data
Exercise - Introduction to Kali Linux
Cybersecurity Contermeasures
Cyber Toolkits
Kali Linux Virtualizations and Installations and Procedures
Exercise - Maltego, theHarvester
Cryptography
Exercise - Veil
Exercise - Social Engineering Tools
Cybersecurity Fundamentals
Windows Security Fundamentals
Windows Security Suite Tools
Vulnerability Assessment
Exercise - Wireshark
Exercise - wpscan, whatweb, dirb, recon-ng
Exercise - Class Activtiy 1
Exercise - Solutions of Class Activity 1
Introduction to Cyber Forensics
Exercise - Class Activity 2
Exercise - Solutions of Class Activity 2
Practical Approach to Cybersecurity
Applying metadata to security
Using Legion to Cyberoperations
Data Gathering and Reconnaissance
Practical Tools to Cyber forensics
SEO Toolkit
Reverse Engineering Tools
Reverse Engineering Methods
Weaponization as part of the Cyber Kill Chain
The application of Reverse Engineering
PDLC - ISO 27001 Cycle
Disaster Recovery Plans on Cybersecurity
Recent Modules
Web Development Practitioner
Last Updated 15th January 2024
36
Machine Learning
Last Updated 11th January 2024
59
Artificial Intelligence
Last Updated 11th January 2024
75
Python Programming
Last Updated 11th January 2024
159
Big Data Analytics / Data Science
Last Updated 11th January 2024
127
Meet your instructor
Fiona Spanca
Meet your instructor
Blerton Abazi
Meet your instructor
Report
Become An Instructor
×