Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The history and story of Sid Sottung Academy's humble foundations and superb success. Humble Beginnings Sid Sottung started off as we all do, a beginner! At the age of 14 working as an assistant in a traditional Italian barbershop in New York, but so eager to make his mark on the industry, Sid at 18 began a his career with Vidal Sassoon by training in their Downtown New York salon as a stylist. After successful stints in their New York & Washington D.C salons he rose to Assistant Creative Director. On the back of a decorated career in Sassoon salons, Sid graduated to their academies as an educator teaching both hairdressing & barbering. Sid’s first stop was the Santa Monica Academy also working for television and teaching at international shows as far afield as China After parting ways with Sassoon, Sid pursued an exciting freelance career guesting & teaching in exclusive salons & barbershops. He was also, proudly a member of the hair team, working on the 2005 blockbuster Pride & Prejudice. Building On Success Having trained educators & written curriculums for other academies, Sid felt that 2014 was the correct time to open his very own academy. Having travelled the globe educating and as a host of other leading industry names, Sid opened the doors of the Sid Sottung Academy in February 2014. “Our academy offers the rare opportunity to study directly under the tutorage of an internationally recognised educator.” After winning various awards and years of success, Sid opened up another location in 2018: his salon and Advanced Academy, Haus of Sottung. As per today his latest venture is the Edinburgh Academy, a bespoke training centre in the beautiful city centre where he offers bespoke training 1:1 or to small groups.
Master the art of self-hosting WordPress on Linux with our comprehensive video course, designed to empower technical professionals to fully control their web presence.
Career Agility in a Changing World A host of global issues such as the growth of artificial intelligence and automation are causing workers in every industry to ask the same question: ""Will my job exist tomorrow?""Workers today need to be equipped with a broad set of skills so they can adapt to an ever-evolving landscape. This session will explore Agile's broad applicability to the world of work and the increasingly influential role it will play across the business spectrum, as well as how practitioners can set themselves apart by embarking on an Agile journey that equips them with the mindset and tools they need to succeed. This and other IIL Learning in Minutes presentations qualify for PDUs. Some titles, such as Agile-related topics may qualify for other continuing education credits such as SEUs, or CEUs. Each professional development activity yields one PDU for one hour spent engaged in the activity. Some limitations apply and can be found in the Ways to Earn PDUs section that discusses PDU activities and associated policies. Fractions of PDUs may also be reported. The smallest increment of a PDU that can be reported is 0.25. This means that if you spent 15 minutes participating in a qualifying PDU activity, you may report 0.25 PDU. If you spend 30 minutes in a qualifying PDU activity, you may report 0.50 PDU.
Recognised Accreditation This course is accredited by continuing professional development (CPD). CPD UK is globally recognised by employers, professional organisations, and academic institutions, thus a certificate from CPD Certification Service creates value towards your professional goal and achievement. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. What is CPD? Employers, professional organisations, and academic institutions all recognise CPD, therefore a credential from CPD Certification Service adds value to your professional goals and achievements. Benefits of CPD Improve your employment prospects Boost your job satisfaction Promotes career advancement Enhances your CV Provides you with a competitive edge in the job market Demonstrate your dedication Showcases your professional capabilities What is IPHM? The IPHM is an Accreditation Board that provides Training Providers with international and global accreditation. The Practitioners of Holistic Medicine (IPHM) accreditation is a guarantee of quality and skill. Benefits of IPHM It will help you establish a positive reputation in your chosen field You can join a network and community of successful therapists that are dedicated to providing excellent care to their client You can flaunt this accreditation in your CV It is a worldwide recognised accreditation What is Quality Licence Scheme? This course is endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. The Quality Licence Scheme is a brand of the Skills and Education Group, a leading national awarding organisation for providing high-quality vocational qualifications across a wide range of industries. Benefits of Quality License Scheme Certificate is valuable Provides a competitive edge in your career It will make your CV stand out Course Curriculum Course Overview Movie - Course Overview 00:06:00 Building Your Virtual Lab Environment Video - Downloading ISO and OVA Fles for VirtualBox 00:08:00 Video and Lab - Creating Virtual Install of Server 2012r2 00:08:00 Video and lab -Create a Virtual Install Of Windows 10 VirtualBox 00:16:00 Video - Taking A Snapshot Of Your Current Configuration 00:04:00 Installing and Configuring Active Directory Video and Lab - Preparing Your Network For Active Directory 00:08:00 Video and Lab - Preparing Server 2012 r2 for Promotion to a Domain Controller 00:10:00 Video and Lab - Join Server 2012 R2 Core to an Existing Domain 00:06:00 Video and Lab - Join a Windows 10 Workstation to a Microsoft Domain 00:15:00 Video and Lab - Promote Server Core to a Domain Controller 00:14:00 Video and Lab- Creating a Server 2012 r2 RODC 00:11:00 Domain Naming System (DNS) Video - Create a Secondary Or Backup DNS Server 00:07:00 Create a DNS Reverse Lookup Zone 00:08:00 Video and Lab - Create a GlobalNames zone * (Requires ADDS being present) 00:11:00 Video - Create a New DNS Host Record 00:02:00 Video - Create a Host Record For a New Website In Microsoft DNS 00:04:00 Video - Creating a DNS MX record 00:04:00 Dynamic Host Configuration Protocol (DHCP) Video and Lab - Install and Configure DHCP on Server 2012 00:11:00 Video - Install the DHCP Role Using PowerShell 00:09:00 Video - How to Authorize/Unauthorize a DHCP Server 00:03:00 Video - How To Edit The Default Gateway Settings In DHCP 00:03:00 Video - Edit DNS Server List In DHCP 00:04:00 Video and Lab - Configuring a DHCP SuperScope 00:04:00 Video and Lab - Manage DHCP Failover in Server 2012 R2 00:08:00 Video - Edit a DHCP Scope 00:03:00 Backup And Restore The DHCP Database 00:03:00 Group Policy Video - Creating a Group Policy Object 00:07:00 Video and Lab - Fine-Grained Password Policy in Windows Server 2012 00:10:00 Video and Lab - Configure Folder Redirection in Window Server 2012 R2 00:11:00 Video and Lab - Creating a Mapped Drive Using Group Policy 00:04:00 Video and Lab - Managing User Desktops Using Group Policy 00:06:00 Video - Prevent Automatic Logoff Due To Inactivity 00:03:00 Video - How To Edit Group Policy Objects To Affect a User 00:03:00 Video - How To Edit a Group Policy Object To Affect a Computer 00:04:00 Video - Backup And Restore Group Policy Objects In Active Directory 00:03:00 Video - Force Screensaver and Timeouts Using Group Policy 00:07:00 Video- Change Users Desktop Background Using Group Policy 00:09:00 Disk Management Video - How To Shrink Or Extend a Volume in Windows Server 2012 00:04:00 Video - How To Format a Volume With ReFS in Windows Server 2019 00:04:00 Video - How To Format a Volume With FAT32 in Windows Server 2019 00:02:00 Print Services TCP/IP Printing Overview 00:08:00 Installing Print Services on Server 2012 R2 00:14:00 Video and Lab - Installing a Network Printer Onto a Windows Client 00:03:00 Video and Lab - Adding a Printer to the Network Using TCP/IP 00:10:00 Video - Printer Pooling 00:06:00 Active Directory Maintenance Video and Lab - Creating a Custom Microsoft Management Console (MMC) 00:06:00 Video and Lab - Creating and Managing Objects in Active Directory 00:14:00 Video and Lab - Performing a Full Backup and Recovery of Server 2012 R2 00:06:00 Video - Rearm the 180-Day Evaluation Period for Wondows Server 00:03:00 Video - Rearm the 30-day Evaluation for Windows 10 00:03:00 Video and Lab - Disable the Internet Explorer Enhanced Security 00:03:00 Video and Lab - Performing an Offline Defragmentation of the Directory Database 00:04:00 Video - Creating a Mapped Drive in Server 2012r2 00:04:00 Video - Create a Heads-Up Display Using BgInfo 00:08:00 Troubleshooting Video - Allow PING Packets through for Server 2012, 2016 and 2019 00:05:00 Video and Lab - Troubleshooting Internet Connectivity 00:16:00 Video - NSLookup 00:05:00 Video - Windows Reliability Monitor (RELI) 00:04:00 Overview of Windows Sysinternal Tools 00:08:00 Video - Overview of Sysinternal's Process Explorer 00:15:00 Obtain Your Certificate Order Your Certificate of Achievement 00:00:00 Get Your Insurance Now Get Your Insurance Now 00:00:00 Feedback Feedback 00:00:00
Establishment in Business Skills The Foundation in Business Skills course is the ideal decision, in the event that you have staff individuals who are right off the bat in their vocation and wish to acquire a sweeping information on the stuff to maintain a fruitful business. Spread across 16, simple to-follow modules, understudies will acquire abilities in a huge number of business-related regions, including funds, methodologies and advertising, giving them the devices that they need, to truly contribute towards the achievement of your business. What's Covered in the Course? The very much organized modules of this course cover in detail the accompanying territories: The essentials of beginning a business - from thought age and business wanting to building a procedure and recognizing the objective market; The monetary parts of a business, including beginning set-up expenses and financing alternatives, just as continuous monetary necessities and prerequisites, for example, income, estimating, keeping accounts and planning; How promoting can profit a business by drawing in and holding clients; this module likewise incorporates helpful data with respect to web-based media publicizing; Step by step instructions to successfully make a brand for your business, to guarantee that it is alluring inside the commercial center; What to consider when utilizing staff, like enrollment, preparing, lawful contemplations and getting the best from your workers; Basic business managerial prerequisites, for example, the sort of protection that the business may profit by, what assessments are required and how to pay them and the significance of staying informed concerning proper legitimate and administrative issues that influence the business; Step by step instructions to viably utilize innovation in your business, remembering the significance of a very much planned site for pulling in clients. What are the Benefits of the Course? There are an entire host of advantages of taking the Foundation in Business Skills course: The organized certificate can assist with speeding up the understudy's profession; Your business will profit by having representatives who are proficient about the stuff to run a fruitful venture, and you will be compensated by realizing that you are putting resources into the fate of your colleagues; There are no section prerequisites, so your representatives needn't stress over having the correct capabilities, to apply; The course content is on the web and organized in a secluded style, so understudies can learn at their own speed, in a spot and during a period that suits them.
Closing Techniques Certificate The Closing Techniques Certification is the ideal course decision, on the off chance that you have staff individuals who have obligation regarding deals in your business, especially for bringing deals to a close. Spread across 5 simple to-follow modules, understudies will acquire abilities in a huge number of zones, including understanding client practices and purchasing choices and building energy and validity with clients, giving them the instruments that they need to truly contribute towards the accomplishment of your business. What's Covered in the Course? The unmistakably organized modules of this course cover the accompanying territories in detail: Instructions to finalize a negotiation in a positive way, utilizing an assortment of strategies, like planning and speed; Tips on the best way to defeat the absolute most normal obstructions to deals and how to successfully persuade clients to change their negative responses into positive ones; Making and conveying attempts to sell something, including understanding various crowds and viably speaking with them; Step by step instructions to construct affinity, validity and trust with possible clients and beat their complaints, including the most well-known deals hindrances and how to get around them; The significance of strategically pitching and how to viably do it, to expand deals for the association; Beating false impressions or issues when selling and how to accentuate the advantages of the items and administrations in the best way and surpass client assumptions; An assessment of the brain research of purchasing, to give your representatives an understanding into a client's point of view, including the fundamental factors that impact a fruitful deal; The significance of good listening abilities, when bringing a deal to a close; Utilizing timing and addressing abilities in the correct manner, to bring a deal to a close in a successful way. What are the Benefits of the Course? There are an entire host of benefits to taking the Closing Techniques Certification for your workers, and they are as per the following: Your business will profit by having workers who are proficient about how to adequately bring a deal to a close and can show these abilities in their job; There are no passage necessities, so your representatives needn't stress over having the correct capabilities, to apply; Students will get a certify authentication in shutting methods, which is useful for their own future profession possibilities.
The Azure Container Service (ACS) is a cloud-based container deployment and management service that supports popular open source tools and technologies for container and container orchestration. ACS allows you to run containers at scale in production and manages the underlying infrastructure for you by configuring the appropriate VMs and clusters for you. This Azure - Containers is designed to instruct you on Azure, and specifically how it pertains to containers. In this course, you will gain a comprehensive overview of containers and spend time understanding what containers are within Azure. You will learn how to use docker host to manage both on-premises and Azure containers. Learn how to use ACS to scale and orchestrate applications using DC/OS, Docker Swarm, or Kubernetes. This course also covers Azure container clustering options. On completion this course, you will be confident enough to use Azure Containers. Finally, you will look at how to install ACS. What Will I Learn? Understand Containers in Azure Deploy Containers Install ACS Understand multi-container applications Requirements Some prior knowledge in Azure is required, or the completion of Introduction to Azure course Introduction Introduction FREE 00:01:00 Introduction to Containers Introduction to Containers 00:04:00 Docker 00:04:00 Deploying Containers 00:08:00 Multi-container Applications 00:02:00 Azure Container Registry 00:03:00 Azure Container Clustering Options 00:02:00 Installing ACS 00:04:00 Conclusion Course Recap 00:02:00 Course Certification
Overview This comprehensive course on CompTIA PenTest+ (Ethical Hacking) will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This CompTIA PenTest+ (Ethical Hacking) comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this CompTIA PenTest+ (Ethical Hacking). It is available to all students, of all academic backgrounds. Requirements Our CompTIA PenTest+ (Ethical Hacking) is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 6 sections • 67 lectures • 10:48:00 total length •Introduction: 00:09:00 •Planning a Pen Test: 00:09:00 •Rules of Engagement: 00:11:00 •Resources and Budget: 00:07:00 •Impact and Constraints: 00:05:00 •Support Resources: 00:13:00 •Legal Groundwork: 00:12:00 •Scope Considerations: 00:11:00 •Lab Environment Setup: 00:23:00 •Project Strategy and Risk: 00:09:00 •Scope Vulnerabilities: 00:14:00 •Compliance-Based Assessments: 00:05:00 •Scanning and Enumeration: 00:05:00 •Scanning Demo: 00:11:00 •Packet Investigation: 00:08:00 •Packet Inspection Demo: 00:06:00 •Application and Open-Source Resources: 00:12:00 •Vulnerability Scanning: 00:09:00 •Vulnerability Scanning Demo: 00:17:00 •Target Considerations: 00:16:00 •Nmap Timing and Performance Options: 00:07:00 •Prioritization of Vulnerabilities: 00:09:00 •Common Attack Techniques: 00:12:00 •Credential Attacks: 00:15:00 •Weaknesses in Specialized Systems: 00:18:00 •Remote Social Engineering: 00:07:00 •Spear Phishing Demo: 00:10:00 •In-Person Social Engineering: 00:12:00 •Network-Based Exploits: 00:07:00 •FTP Exploit Demo: 00:08:00 •Man-in-the-middle Exploits: 00:07:00 •Wireless Exploits: 00:14:00 •Application Exploits, Part 1: 00:06:00 •SQL Injection Demo: 00:09:00 •Application Exploits, Part 2: 00:08:00 •Application Exploits, Part 3: 00:09:00 •Cross-Site Scripting Demo: 00:07:00 •Code Vulnerabilities: 00:17:00 •Local Host Vulnerabilities: 00:05:00 •Privilege Escalation (Linux): 00:10:00 •Privilege Escalation (Windows): 00:06:00 •Misc. Privilege Escalation: 00:08:00 •Misc. Local Host Vulnerabilities: 00:08:00 •Physical Security: 00:11:00 •Post-Exploitation Techniques: 00:11:00 •Persistence and Stealth: 00:11:00 •Nmap Scoping & Output Options: 00:21:00 •Pen Testing Toolbox: 00:07:00 •Using Kali Linux: 00:06:00 •Scanners & Credential Tools: 00:10:00 •Code-Cracking Tools: 00:05:00 •Open-Source Research Tools: 00:07:00 •Wireless and Web Pen Testing Tools: 00:11:00 •Remote Access Tools: 00:06:00 •Analyzers and Mobile Pen Testing Tools: 00:03:00 •Other Pen Testing Tools: 00:05:00 •Using Scripting in Pen Testing: 00:13:00 •Bash Scripting Basics: 00:15:00 •Bash Scripting Techniques: 00:10:00 •PowerShell Scripts: 00:04:00 •Ruby Scripts: 00:07:00 •Python Scripts: 00:06:00 •Scripting Languages Comparison: 00:11:00 •Writing Reports: 00:16:00 •Post-Report Activities: 00:06:00 •Mitigation Strategies: 00:05:00 •Communication: 00:10:00