Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: Threat and Vulnerability Assessment for Enterprises

Descriptions

Course Curriculum

Section 1: Course Introduction
The Course Overview 00:00:00
About the Course 00:00:00
How to Get most out of This course 00:00:00
Cyber Security Terminologies 00:00:00
Section 2: Lab Setup
Virtual Machine 00:00:00
Windows VM Installation FREE 00:00:00
Kali Linux VM Installation FREE 00:00:00
Section 3: Open Source Intelligence Gathering
OSINT Cycle 00:00:00
Social Media and Geolocation Information 00:00:00
Network, Government, and Business Information 00:00:00
Dark Web Information 00:00:00
Section 4: Network and Website Services Enumeration
Service Enumeration Overview 00:00:00
Nmap Port Scanner FREE 00:00:00
Masscan Enumeration 00:00:00
Web Frontend and Backend Information 00:00:00
Domain information Using Recon-ng 00:00:00
Web Crawling Using HTTrack 00:00:00
Section 5: Web Application Vulnerability Enumeration
Web Application Assessment Overview 00:00:00
Acunetix Web Vulnerability Scanner FREE 00:00:00
OWASP ZAP Proxy 00:00:00
Burp Suite Web Analyzer 00:00:00
WPScan for WordPress Scanning 00:00:00
Section 6: Network Vulnerability Enumeration
Network Vulnerability Assessment Overview 00:00:00
Nmap and Zenmap 00:00:00
Tripwire SeureCheq Scanner 00:00:00
Nessus Network Vulnerability Scanner 00:00:00
Summary 00:00:00
Section 7: Discovery of Major Cyber Security Vulnerabilities in Web Application
Web Application VM Lab Setup 00:00:00
SQL Injection Attack 00:00:00
Cross-Site Scripting Attack 00:00:00
Cross-Site Request Forgery Attack 00:00:00
Denial of Service Attack (DOS) 00:00:00
Section 8: Discovery of Other Cyber Security Vulnerabilities in Websites
Buffer Overflow Attack 00:00:00
File Upload Attack 00:00:00
Insecure Cryptographic Storage 00:00:00
Sensitive Data Exposure 00:00:00
Local File Inclusion 00:00:00
Brute Force Attack 00:00:00
Section 9: Discovery of Major Cyber Security Vulnerabilities in Networks
Various Server Vulnerabilities 00:00:00
Protocol Password Attack 00:00:00
Sniffing Spoofing 00:00:00
Wireless Attack 00:00:00
Flooding Attack 00:00:00
Section 10: Discovery of Other Cyber Security Vulnerabilities in Networks
Various System Vulnerabilities 00:00:00
Phishing Attack 00:00:00
Windows Vulnerabilities 00:00:00
Malware Attack to Breach Security 00:00:00
Browser Vulnerabilities 00:00:00
Section 11: Triage – Security Incidents
Security Triage Overview 00:00:00
Types of Security Incidents 00:00:00
External Media Attack (USB) 00:00:00
Drive by Download Attack 00:00:00
Attrition Attack 00:00:00
Email Attack 00:00:00
Section 12: Remediation of Cyber Attacks on Organizations
Monitor Network Connections 00:00:00
Spoofing Attack Remediation 00:00:00
System Auditing Process 00:00:00
Identify Basic Threats 00:00:00
Deploy a Vulnerability Management System 00:00:00
Course Summary 00:00:00
Online Learning Thailand.
X