Course Overview

Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises.

Understand the principles of enterprise-level security and the elements of effective security policies

Install and configure network and host-based security technologies.

Describe the standards and products used to enforce security on web and application technologies.

Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.

Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises.


Start learning today!

₹ 599

₹00 % off

Excluding GST 18%

Enroll Now

Syllabus

Best-in-class content by leading faculty and industry leaders in the form of videos, cases and projects

Course Description

The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and eff...

Read more

Course Objective

The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and e...

Read more

Skills You Will Gain

Cyber Security

Read more

 

1 Course Introduction

2 Lab Setup

3 Open Source Intelligence Gathering

4 Netw ork and Website Services Enumeration

5 Web Application Vulnerability Enumeration

6 Network Vulnerability Enumeration

7 Discovery of Major Cyber Security Vulnerabilities in Web Application

8 Discovery of Other Cyber Security Vulnerabilities in Websites

9 Discovery of Major Cyber Security Vulnerabilities in Networks

10 Discovery of Other Cyber Security Vulnerabilities in Networks

11 Triage – Security Incidents

12 Remediation of Cyber Attacks on Organizations

Packt

Packt, is a publishing company founded in 2003 headquartered in Birmingham, UK. .

...

Shareable on:

You can share your Course Certificates in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.

...

Our Other Content Partners

...
...
...
...
...
...