The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches
Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises.
Understand the principles of enterprise-level security and the elements of effective security policies
Install and configure network and host-based security technologies.
Describe the standards and products used to enforce security on web and application technologies.
Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises.
1 Course Introduction
2 Lab Setup
3 Open Source Intelligence Gathering
4 Network and Website Services Enumeration
5 Web Application Vulnerability Enumeration
6 Network Vulnerability Enumeration
7 Discovery of Major Cyber Security Vulnerabilities in Web Application
8 Discovery of Other Cyber Security Vulnerabilities in Websites
9 Discovery of Major Cyber Security Vulnerabilities in Networks
10 Discovery of Other Cyber Security Vulnerabilities in Networks
11 Triage – Security Incidents12 Remediation of Cyber Attacks on Organizations