TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 114 - Cyber security and Big Data Analysis

Code Start Date Duration Venue
IT-S 114 02 October 2023 5 Days Istanbul Registration Form Link
IT-S 114 27 November 2023 5 Days Istanbul Registration Form Link
IT-S 114 25 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

An ethical hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The program prepares individuals in the specific network security discipline for Ethical Hacking from a vendor-neutral perspective.

Course Objectives

  • Introducing Ethical Hacking
  • Understanding how cloud works
  • Exploring Policy and organizational risks
  • Establishing Principles for Internet of Things (IoT) Security
  • Learning the procedures to use a virtual bridge and connect to a physical network using Mobile Security Toolkit

Who Should Attend?

  • IT Managers
  • Network Managers
  • Security Managers
  • Site Administrators
  • Network Administrators
  • Technical Support Engineers
  • Systems Engineers
  • Government Agencies

Course Details/Schedule

Day 1

  • Cloud computing security
  • Cloud Architecture
  • Governing in the Cloud 
  • Operating in the Cloud 
  • Cloud Computing Risk Assessment Guidelines
  • Key legal issues

Day 2

  • Introduction to Ethical Hacking
  • The CEH v10
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Malware Analysis
  • System Hacking
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking

Day 3

  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Hacking Webservers
  • Evading IDS, Firewalls and Honeypot
  • Cryptography

Day 4

  • STORM: a mobile security tool
  • Technical Introduction to the Storm platform
  • Network Security Threats, Vulnerabilities, and Attacks
  • Network Traffic Monitoring and Analysis 
  • Network Risk and Vulnerability Management
  • Hacking Concepts, Types, and Phases
  • Exploring the Hacking Methodology
  • Wireless Network Threats and Attack

Day 5

  • IoT Security Principles
  • Security Landscape
  • Principles for Connected Devices
  • IoT Design Principles
  • Principles of IoT Security
  • IoT Attack Areas
  • IoT Vulnerabilities
  • IoT Firmware Analysis
  • IoT Software Weaknesses
  • IoT Security Assessment on IoT devices