The Absolute Beginners Guide to Cyber Security Part 3

You should have completed three previous courses, this course is a continuation of the previous courses: a) The Absolute Beginners Guide to Cyber Security and Hacking b)The Absolute Beginners Guide to Cyber Security Part 1 c)The Absolute Beginners Guide to Hacking Part 2

Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.

Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.

Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.

Who this course is for:
Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain
This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.


Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top