The Absolute Beginners Guide to Cyber Security Part 3

The Absolute Beginners Guide to Cyber Security Part 3 

Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques 

 
 
What you'll learn
  • You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
  • You will feel confident and comfortable with cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
  • You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
  • You will be able to explain on your own the types of ransomwares, how crypto ransomware works and will go through a real world example of a ransomware attack on the Bristol Airport Screens.
  • You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
  • You can give insightful talks on zero-day exploit, malware and its types, man in the middle (mitm) attack and can get conversant with web application security.
 
Description
Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.
Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.
Who this course is for:
  • Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain
  • This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.
 

 Enroll Now
Join Whatsapp Group  |   Join Telegram Group

Post a Comment