Duration 5 Days 30 CPD hours This course is intended for IS Security Officers IS Managers Risk Managers Auditors Information Systems Owners IS Control Assessors System Managers Government Employees Overview The person who carries this certification should be able to acquire necessary resources, advise senior leadership, collaborate with stakeholders, evaluate effectiveness, identify cybersecurity problems, manage threats, oversee information security awareness programs, participate in risk assessments, support compliance activities, and define or implement policies and procedures to ensure protection of critical infrastructure within an information security environment. If you are looking for the ?gotta have it? cybersecurity course, then the Certified Information Systems Security Officer is for you.ÿ The C)ISSO will prepare you for multiple managerial roles inside the INFOSEC community by covering a broad range of topics. You will learn theories in security concepts, practices, monitoring and compliance in IS management. An Information Systems Security Officer is able to implement and maintain cost-effective security controls that are closely aligned with business and industry standards. The C)ISSO certification course is an idealÿway to increaseÿknowledge, expertise, and skill for managers, auditors, and INFOSEC professionals.ÿ At Mile2 we consider the C)ISSO to be one of our flagship courses.The things you learn in this course can be applied to management, prevention teams, and recovery professionals. Material learned in the Live Class or Self-Study options will apply directly to the certification exam. Course Outline Risk Management Security Management Identification and Authentication Access Control Security Models and Evaluation Operations Security Vulnerability Assessments Symmetric Cryptography and Hashing Network Connections Network Protocols and Devices Telephony, VPNs, and Wireless Security Architecture and Attacks Software Development Security Database Security Malware and Software Attacks Business Continuity Disaster Recovery Incident Management, Law, and Ethics Physical Security Additional course details: Nexus Humans C)ISSO - Certified Information Security Systems Officer Mile 2 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the C)ISSO - Certified Information Security Systems Officer Mile 2 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 0.5 Days 3 CPD hours This course is intended for This course is designed for the non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. Overview In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks. You will: Identify the need for security Secure devices like desktops, laptops, smartphones, and more Use the Internet securely Regardless of your computer experience, this class will help you become more aware of technology ðrelated risks and what you can do to protect yourself and your organization from them. This course will help you to: ? Understand security compliance needs and requirements ? Recognize and avoid phishing and other social engineering ? Recognize and avoid viruses, ransomware, and other malware ? Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud. In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely. Course includes access to the CyberSAFE assessment. Upon successful completion of the assessment, learners will receive the CyberSAFE credential and digital badge. Identifying the Need for Security Identify Security Compliance Requirements Recognize Social Engineering and Avoid Phishing and other Attacks Securing Devices Maintain Physical Security of Devices Use Passwords for Security Protect Your Data Identify and Mitigate Viruses, Ransomware, and other Malware Use Wireless Devices Securely Using the Internet Securely Browse the Web Safely Use Email Securely Use Social Networking Securely Use Cloud Services Securely Additional course details: Nexus Humans CertNexus CyberSAFE Extended Edition 2019 (CBS-310) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CertNexus CyberSAFE Extended Edition 2019 (CBS-310) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for Technical professionals who need to install, configure, and manage Virtual Security Extension (VSX) solutions within their network security environment. Overview Explain the benefits of virtual network security. Understand the basic functions, components, and advantages of VSX technology. Examine the VSX management infrastructure and understand how traffic flows within a VSX network. Discuss options for deploying VSX technology within various types of organizations. Understand how to install and configure VSX Gateways and Virtual Systems. Describe different routing schemes and features that are available to use within the VSX environment. Understand how to deploy additional VSX networking configurations that may be required in the environment. Understand the differences between deploying physical Security Gateway Clusters and VSX Gateway Clusters. Understand how Virtual System Load Sharing works to enhance VSX network performance. Understand how to use the VSX Provisioning Tool to add and remove virtual devices. Recall how CoreXL technology enhances Security Gateway performance and recognize how to use the technology in a VSX environment. Understand how to employ tools for optimizing resources allocated in a VSX environment. Identify various VSX command line tools commonly used to retrieve information and perform configuration changes. Understand how to use VSX utility commands to perform various maintenance tasks for the VSX environment. Understand how to troubleshoot and debug issues that may occur in a VSX environment. This course provides a comprehensive understanding of the Check Point VSX solution and describes how to deploy it within the corporate network environment. Course Topics VSX Overview Virtual System Installation and Configuration VSX Clustering Advanced VSX Features Troubleshooting VSX LAB EXERCISES Configuring the VSX Environment Deploying a Virtual System with a Physical Interface Deploying a VS with Bonded VLAN Interfaces Configuring Virtual System HA Converting VSX High Availability to Virtual System Load Sharing Maintaining the VSX Environment Using the CLI to Manage VSX Performance Tuning in VSX Troubleshooting VSX Issues Upgrading a VSX Environment Additional course details: Nexus Humans CCVS Check Point Certified VSX Specialist training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CCVS Check Point Certified VSX Specialist course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
This video course will prepare you to take and pass the CompTIA IT Fundamentals (ITF+) certification (FC0-U61) exam confidently by helping you get to grips with all the major domains covered in the certification and enabling you to develop the skills required to set up, configure, and secure desktop PC, mobile, and networking devices.
Overview In today's rapidly evolving world, the significance of security cannot be overstated. The 'Basic Security Guard Training' course offers a comprehensive introduction to the multifaceted realm of security, ensuring that learners grasp the foundational concepts and methodologies. From understanding the very essence of security to delving into the intricacies of risk analysis, this course covers a broad spectrum. Learners will be equipped with the knowledge of both physical and informational security measures and will be trained to respond adeptly to immediate crises. Furthermore, the course sheds light on the pivotal role of technology in security management, ensuring that participants are well-versed in contemporary security solutions. Learning Outcomes: Understand the fundamental definition and significance of security in various contexts. Analyse security risks and implement effective risk reduction strategies. Differentiate between physical and informational security measures and apply them appropriately. Respond efficiently to immediate security crises and manage potential threats. Familiarise oneself with the legal framework and regulations governing security in the UK. Why buy this Basic Security Guard Training ? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Basic Security Guard Training there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Basic Security Guard Training course for? Individuals aspiring to embark on a career in the security sector in the UK. Organisational staff members keen on enhancing their understanding of workplace security. Business owners aiming to bolster their premises' security measures. Technology enthusiasts eager to explore the intersection of tech and security. Public service workers, such as traffic controllers, seeking to integrate security knowledge into their roles. Prerequisites This Basic Security Guard Training does not require you to have any prior qualifications or experience. You can just enrol and start learning. Career path Security Analyst - Average salary range: £30,000 - £45,000 Annually Security Consultant - Average salary range: £40,000 - £60,000 Annually Physical Security Manager - Average salary range: £35,000 - £50,000 Annually Information Security Officer - Average salary range: £45,000 - £65,000 Annually Crisis Response Coordinator - Average salary range: £32,000 - £48,000 Annually Security Technology Specialist - Average salary range: £38,000 - £55,000 Annually Course Curriculum Module 01: Definition and Importance of Security Definition and Importance of Security 00:16:00 Module 02: Career Prospect of Security Guard in the UK Career Prospect of Security Guard in the UK 00:11:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:25:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:36:00 Module 05: Response to Immediate Crisis Response to Immediate Crisis 00:26:00 Module 06: The Use of Technology for Managing Security The Use of Technology for Managing Security 00:25:00 Module 07: General Patrol Tactics and Techniques General Patrol Tactics and Techniques 00:25:00 Module 08: Public Relations and Traffic Control Public Relations and Traffic Control 00:21:00 Module 09: Violence in the Workplace Violence in the Workplace 00:27:00 Module 10: Laws and Regulations Laws and Regulations 00:29:00 Assignment Assignment - Basic Security Guard Training 00:00:00
Overview This comprehensive course on Computer Networks Security will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Computer Networks Security comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Computer Networks Security. It is available to all students, of all academic backgrounds. Requirements Our Computer Networks Security is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 12 sections • 52 lectures • 08:08:00 total length •Introduction: 00:10:00 •1.1 Computer Network: 00:11:00 •1.2 Computer Network Topologies: 00:11:00 •1.3 Categories of Computer Network: 00:10:00 •1.4 Computer Network Devices: 00:11:00 •1.5 Transmission Media: 00:09:00 •2.1 ISO/OSI Model: 00:10:00 •2.2 Application, Presentation, and Session Layers: 00:12:00 •2.3 Transport and Network Layers: 00:11:00 •2.4 Data Link and Physical Layers: 00:09:00 •2.5 ISO/OSI Model in Action: 00:10:00 •3.1 Introduction to Computer Networks Protocols: 00:11:00 •3.2 IP Protocol: 00:13:00 •3.3 TCP and UDP Protocols: 00:12:00 •3.4 Application Protocols: 00:12:00 •3.5 TCP/IP Characteristics and Tools: 00:11:00 •4.1 Wireless Networks Benefits: 00:09:00 •4.2 Types of Wireless Networks: 00:12:00 •4.3 Wireless Networks Protocol (Wi-Fi): 00:07:00 •4.4 Wireless Networks Devices: 00:10:00 •4.5 Wireless Networks Drawbacks: 00:09:00 •5.1 Security Goals: 00:09:00 •5.2 Securing the Network Design: 00:10:00 •5.3 TCP/IP Security and Tools: 00:12:00 •5.4 Port Scanning and Tools: 00:11:00 •5.5 Sniffing and Tools: 00:10:00 •6.1 Reasons to Use Firewall: 00:13:00 •6.2 Firewalls Rules: 00:11:00 •6.3 Firewalls Filtering: 00:09:00 •6.4 Honeypots: 00:07:00 •6.5 Bypassing Firewalls: 00:08:00 •7.1 Intrusion Detection System: IDS: 00:11:00 •7.2 Network IDS: NIDS: 00:06:00 •7.3 NIDS Challenges: 00:09:00 •7.4 Snort as NIDS: 00:08:00 •7.5 Intrusion Prevention Systems: IPS: 00:07:00 •8.1 Wired Equivalent Privacy WEP Attacking: 00:11:00 •8.2 WPA and AES Protocols: 00:09:00 •8.3 Wireless Security Misconceptions: 00:09:00 •8.4 Wireless Attacks and Mitigation: 00:09:00 •8.5 Secure Network Design with Wireless: 00:09:00 •9.1 Physical Security Objectives: 00:11:00 •9.2 Physical Threats and Mitigation: 00:11:00 •9.3 Defense in Depth (DiD): 00:07:00 •9.4 Incident: 00:06:00 •9.5 Incident Handling: 00:14:00 •10.1 Confidentiality, Integrity, and Availability (CIA): 00:06:00 •10.2 Assets, Threats, and Vulnerabilities: 00:04:00 •10.3 Risks and Network Intrusion: 00:06:00 •10.4 Common Attacks: 00:09:00 •10.5 Security Recommendations: 00:06:00 •Assignment - Computer Networks Security: 00:00:00
Description: The CompTIA Security+ (SY0-401) certification course provides information about the corporate security which is recognised as one of the fastest-growing fields in IT. Every institution even small business invests in IT security to secure their confidential data. The course covers the security fundamentals including the information security cycle, information security controls, authentication methods, cryptography fundamentals, and security policy fundamentals. Throughout the course, you will learn the Security Threats and vulnerabilities, Managing data, Application and Host Security, and the system of implementing Networking Security, implementing access control, authentication and Account Management, and implementing Compliance and Operating Security. Finally, the course will teach you how to manage certificates, how to manage risk, how to troubleshoot and manage security incidents, and the proper Business Continuity and Disaster Recovery Planning. In short, the course helps you to acquire competency in network infrastructure, system security, organizational security and access control. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Security+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Security Fundamentals The Information Security Cycle FREE 00:37:00 Information Security Controls 00:35:00 Authentication Methods 00:09:00 Cryptography Fundamentals 00:56:00 Security Policy Fundamentals 00:11:00 Identifying Security Threats and Vulnerabilities Social Engineering 00:31:00 Malware 00:25:00 Software-Based Threats 00:21:00 Based Threats 00:38:00 Wireless Threats and Vulnerabilities 00:43:00 Physical Threats and Vulnerabilities 00:09:00 Managing Data, Application, and Host Security Manage Data Security 00:47:00 Manage Application Security 00:56:00 Manage Device and Host Security 01:07:00 Manage Mobile Security 00:10:00 Implementing Network Security Configure Security Parameters on Network Devices and Technologies 00:49:00 Network Design Elements and Components 00:26:00 Implement Networking Protocols and Services 01:09:00 Apply Secure Network Administration Principles 00:12:00 Secure Wireless Traffic 00:31:00 Implementing Access Control, Authentication, and Account Management Access Control and Authentication Services 00:42:00 Implement Account Management Security Controls 00:33:00 Managing Certificates Install a CA Hierarchy 00:25:00 Enroll Certificates 00:13:00 Secure Network Traffic by Using Certificates 00:03:00 Renew Certificates 00:01:00 Back Up and Restore Certificates and Private Keys 00:05:00 Revoke Certificates 00:07:00 Implementing Compliance and Operational Security Physical Security 00:20:00 Legal Compliance 00:10:00 Security Awareness and Training 00:11:00 Integrate Systems and Data with Third Parties 00:08:00 Risk Management A Risk Analysis 00:17:00 Implement Vulnerability Assessment Tools and Techniques 00:04:00 Scan for Vulnerabilities 00:27:00 Mitigation and Deterrent Techniques 00:19:00 Troubleshooting and Managing Security Incidents Respond to Security Incidents 00:23:00 Recover from a Security Incident 00:09:00 Business Continuity and Disaster Recovery Planning Business Continuity 00:17:00 Plan for Disaster Recovery 00:17:00 Execute DRPs and Procedures 00:13:00 Mock Exam Mock Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Security+ Certification - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
Unlock the gateway to a secure future with the Door Supervisor Training Course, a comprehensive program designed to equip you with the essential skills and knowledge needed in the security sector. This course provides an in-depth understanding of the security industry, starting with the foundational concepts of security and its significance in today's society. As you journey through the modules, you'll explore the varied career prospects for security guards in the UK, learn about risk analysis and reduction strategies, and understand the importance of physical and information security. The course is structured to build your expertise progressively, ensuring a deep and practical understanding of the subject. Further, the curriculum covers crucial areas such as effective response to crises, harnessing technology for security management, and mastering patrol tactics. You'll also gain valuable insights into public relations, traffic control, and handling workplace violence, essential skills for any security professional. The final module delves into the laws and regulations governing the security industry, ensuring you are well-versed in the legal aspects of your role. This course not only prepares you for a career as a door supervisor but also empowers you with skills transferable across various sectors within security. Learning Outcomes Understand the role and importance of security in contemporary society. Explore career opportunities and growth prospects in the UK security sector. Master techniques in security risk analysis and effective risk reduction. Gain skills in physical security, information protection, and crisis response. Acquire knowledge of security technology, patrol tactics, public relations, and legal compliance. Why choose this Door Supervisor Training? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards and CIQ after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Unlock career resources for CV improvement, interview readiness, and job success. Who is this Door Supervisor Training for? Individuals aspiring to become door supervisors or security guards. Existing security personnel seeking to enhance their skills and knowledge. Professionals interested in transitioning to a security-focused career. Those looking to understand the legal and practical aspects of security. Anyone interested in learning about crisis management and public safety. Career path Door Supervisor: £18,000 - £25,000 Security Guard: £20,000 - £30,000 Crisis Response Officer: £25,000 - £35,000 Security Manager: £30,000 - £45,000 Public Safety Coordinator: £22,000 - £32,000 Security Consultant: £28,000 - £50,000 Prerequisites This Door Supervisor Training does not require you to have any prior qualifications or experience. You can just enrol and start learning. This course was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Definition and Importance of Security Definition and Importance of Security 00:16:00 Module 02: Career Prospect of Security Guard in the UK Career Prospect of Security Guard in the UK 00:11:00 Module 03: Security Risk Analysis and Risk Reduction Security Risk Analysis and Risk Reduction 00:25:00 Module 04: Physical and Information Security Protection Physical and Information Security Protection 00:36:00 Module 05: Response to Immediate Crisis Response to Immediate Crisis 00:26:00 Module 06: The Use of Technology for Managing Security The Use of Technology for Managing Security 00:25:00 Module 07: General Patrol Tactics and Techniques General Patrol Tactics and Techniques 00:25:00 Module 08: Public Relations and Traffic Control Public Relations and Traffic Control 00:21:00 Module 09: Violence in the Workplace Violence in the Workplace 00:27:00 Module 10: Laws and Regulations Laws and Regulations 00:29:00
Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00
QLS Endorsed + CPD QS Accredited - Dual Certification | Instant Access | 24/7 Tutor Support