Threat and Vulnerability Assessment for Enterprises
Threat and Vulnerability Assessment for Enterprises, available at $34.99, has an average rating of 3.7, with 62 lectures, based on 54 reviews, and has 358 subscribers.
You will learn about Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises. Understand the principles of enterprise-level security and the elements of effective security policies. Install and configure network and host-based security technologies. Describe the standards and products used to enforce security on web and application technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery. Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises. This course is ideal for individuals who are This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators. It is particularly useful for This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.
Enroll now: Threat and Vulnerability Assessment for Enterprises
Summary
Title: Threat and Vulnerability Assessment for Enterprises
Price: $34.99
Average Rating: 3.7
Number of Lectures: 62
Number of Published Lectures: 62
Number of Curriculum Items: 62
Number of Published Curriculum Objects: 62
Original Price: $109.99
Quality Status: approved
Status: Live
What You Will Learn
- Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises.
- Understand the principles of enterprise-level security and the elements of effective security policies.
- Install and configure network and host-based security technologies.
- Describe the standards and products used to enforce security on web and application technologies.
- Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
- Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises.
Who Should Attend
- This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.
Target Audiences
- This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.
Technology continues to evolve more rapidly than ever, and the demand for enterprises to continuously update their policies is more vital than ever. No longer are attackers continuing to throw sophisticated attacks that can cripple a business (ex. Ransomware) at the largest companies. Small and medium-sized businesses are no longer safe, and in many cases after a cyber-attack, companies are rarely prepared for future incidents.
In this course, we’ll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability assessment, and provide the hands-on instruction necessary to produce a vigorous defensive strategy from day one.
The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches.
About The Author
A computer and cybersecurity expert, Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for and a member of many key organizations. Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations, and products. His primary passion is cybersecurity, but he understands that to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients’ expectations.
Course Curriculum
Chapter 1: Course Introduction
Lecture 1: The Course Overview
Lecture 2: About the Course
Lecture 3: How to Get most out of This course?
Lecture 4: Cyber Security Terminologies
Chapter 2: Lab Setup
Lecture 1: Virtual Machine
Lecture 2: Windows VM Installation
Lecture 3: Kali Linux VM Installation
Chapter 3: Open Source Intelligence Gathering
Lecture 1: OSINT Cycle
Lecture 2: Social Media and Geolocation Information
Lecture 3: Network, Government, and Business Information
Lecture 4: Dark Web Information
Chapter 4: Network and Website Services Enumeration
Lecture 1: Service Enumeration Overview
Lecture 2: Nmap Port Scanner
Lecture 3: Masscan Enumeration
Lecture 4: Web Frontend and Backend Information
Lecture 5: Domain information Using Recon-ng
Lecture 6: Web Crawling Using HTTrack
Chapter 5: Web Application Vulnerability Enumeration
Lecture 1: Web Application Assessment Overview
Lecture 2: Acunetix Web Vulnerability Scanner
Lecture 3: OWASP ZAP Proxy
Lecture 4: Burp Suite Web Analyzer
Lecture 5: Nikto
Lecture 6: WPScan for WordPress Scanning
Chapter 6: Network Vulnerability Enumeration
Lecture 1: Network Vulnerability Assessment Overview
Lecture 2: Nmap and Zenmap
Lecture 3: Tripwire SeureCheq Scanner
Lecture 4: Nessus Network Vulnerability Scanner
Lecture 5: Summary
Chapter 7: Discovery of Major Cyber Security Vulnerabilities in Web Application
Lecture 1: Web Application VM Lab Setup
Lecture 2: SQL Injection Attack
Lecture 3: Cross-Site Scripting Attack
Lecture 4: Cross-Site Request Forgery Attack
Lecture 5: Denial of Service Attack (DOS)
Chapter 8: Discovery of Other Cyber Security Vulnerabilities in Websites
Lecture 1: Buffer Overflow Attack
Lecture 2: File Upload Attack
Lecture 3: Insecure Cryptographic Storage
Lecture 4: Sensitive Data Exposure
Lecture 5: Local File Inclusion
Lecture 6: Brute Force Attack
Chapter 9: Discovery of Major Cyber Security Vulnerabilities in Networks
Lecture 1: Various Server Vulnerabilities
Lecture 2: Protocol Password Attack
Lecture 3: Sniffing/Spoofing
Lecture 4: Wireless Attack
Lecture 5: Flooding Attack
Chapter 10: Discovery of Other Cyber Security Vulnerabilities in Networks
Lecture 1: Various System Vulnerabilities
Lecture 2: Phishing Attack
Lecture 3: Windows Vulnerabilities
Lecture 4: Malware Attack to Breach Security
Lecture 5: Browser Vulnerabilities
Chapter 11: Triage – Security Incidents
Lecture 1: Security Triage Overview
Lecture 2: Types of Security Incidents
Lecture 3: External Media Attack (USB)
Lecture 4: Drive by Download Attack
Lecture 5: Attrition Attack
Lecture 6: Email Attack
Chapter 12: Remediation of Cyber Attacks on Organizations
Lecture 1: 7 Ways to Stop Cyber Security Attacks
Lecture 2: Monitor Network Connections
Lecture 3: Spoofing Attack Remediation
Lecture 4: System Auditing Process
Lecture 5: Identify Basic Threats
Lecture 6: Deploy a Vulnerability Management System
Lecture 7: Course Summary
Instructors
-
Packt Publishing
Tech Knowledge in Motion
Rating Distribution
- 1 stars: 5 votes
- 2 stars: 2 votes
- 3 stars: 15 votes
- 4 stars: 18 votes
- 5 stars: 14 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024