Einführung in die Themen Ethical Hacking und Penetration-Testing.
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more.
Nutzen
Key issues plaguing the information security world and information security laws and standards.
Fundamentals of ethical hacking
Information security threats and vulnerabilities
Different types of malware
Different types of password-cracking techniques and countermeasures
Social engineering techniques, insider threats, identity theft, and countermeasures
Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures.
Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
Wireless encryption, wireless threats, and countermeasures
Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
IoT and OT concepts, attacks, and countermeasures
Cloud computing technologies, cloud computing threats, attacks, and security techniques
Fundamentals of pen testing
Zielgruppe
School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience.
Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
Anyone who wants to prepare for a cybersecurity career and aid their IT education.
Professionals who want to get into the cybersecurity field but are unsure where to start their education journey
Inhalte
Module 01: Information Security Fundamentals
Module 02: Ethical Hacking Fundamentals
Module 03: Information Security Threats and Vulnerability Assessment
Module 04: Password Cracking Techniques and Countermeasures
Module 05: Social Engineering Techniques and Countermeasures
Module 06: Network Level attacks and Countermeasures
Module 07: Web application and Countermeasures
Module 08: Wireless Attacks Countermeasures
Module 09: Mobile Attacks ans Countermeasures
Module 10: IoT and OT Attacks and Countermeasures
Module 11: Cloud Computing threats and Countermeasures
Module 12: Penetration Testing and Countermeasures
Eine detaillierte Preisaufstellungen finden Sie im jeweiligen Veranstaltungstermin in der Terminauswahl. Die Preise verstehen sich bei Unternehmern gem. § 14 BGB zzgl. MwSt. Der dargestellte Ab-Preis entspricht dem niedrigsten verfügbaren Gesamtpreis pro Person.
Der Filter Ort steht Ihnen nicht zur Verfügung, da hierfür eine externe Verbindung zu Google Maps aufgebaut werden muss und Sie keine entsprechenden Verbindungen bzw. Cookies zugelassen haben. Cookie-Einstellungen ändern
Weitere interessante Seminare für Sie
Navigating through the elements of the carousel is possible using the tab key. You can skip the carousel or go straight to carousel navigation using the skip links.Press to skip carousel