(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 114 - Cyber security and Big Data Analysis
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 114 | 21 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 114 | 18 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 114 | 16 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
An ethical hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The program prepares individuals in the specific network security discipline for Ethical Hacking from a vendor-neutral perspective.
Course Objectives
- Introducing Ethical Hacking
- Understanding how cloud works
- Exploring Policy and organizational risks
- Establishing Principles for Internet of Things (IoT) Security
- Learning the procedures to use a virtual bridge and connect to a physical network using Mobile Security Toolkit
Who Should Attend?
- IT Managers
- Network Managers
- Security Managers
- Site Administrators
- Network Administrators
- Technical Support Engineers
- Systems Engineers
- Government Agencies
Course Details/Schedule
Day 1
- Cloud computing security
- Cloud Architecture
- Governing in the Cloud
- Operating in the Cloud
- Cloud Computing Risk Assessment Guidelines
- Key legal issues
Day 2
- Introduction to Ethical Hacking
- The CEH v10
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Malware Analysis
- System Hacking
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
Day 3
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Hacking Webservers
- Evading IDS, Firewalls and Honeypot
- Cryptography
Day 4
- STORM: a mobile security tool
- Technical Introduction to the Storm platform
- Network Security Threats, Vulnerabilities, and Attacks
- Network Traffic Monitoring and Analysis
- Network Risk and Vulnerability Management
- Hacking Concepts, Types, and Phases
- Exploring the Hacking Methodology
- Wireless Network Threats and Attack
Day 5
- IoT Security Principles
- Security Landscape
- Principles for Connected Devices
- IoT Design Principles
- Principles of IoT Security
- IoT Attack Areas
- IoT Vulnerabilities
- IoT Firmware Analysis
- IoT Software Weaknesses
- IoT Security Assessment on IoT devices