• Search...

categories: Technology & Innovation

Technology
Cyber Security,datasecurity,ethicalhacking
SDG 9: Industry, Innovation and Infrastructure

Ethical Hacking & Security Assessment

Duration: 4 h 50 m / 33 lessons

Level: Specialized

Course Language: Arabic

By the end of this course, you will be able to

  • By the end of this course, you will be able to: Configure access management ASA.

  • Configure Cisco ASA interface security levels.

  • Configure the default Cisco Modular Policy Framework (MPF).

Course details

  • 4 h 50 m/33 lessons
  • Last updated: 27/10/2022
  • Course completion certificate

Course Content

Free lessons

1.

Basic Terms

9 Minutes
2.

Vulnerabilities

4 Minutes
3.

Types of Hackers

8 Minutes
4.

Penetration Test (Pentest)

10 Minutes
1.

Basic Terms

9 Minutes
2.

Vulnerabilities

4 Minutes
3.

Types of Hackers

8 Minutes
4.

Penetration Test (Pentest)

10 Minutes
5.

Vulnerability Scaning

9 Minutes
6.

Penetration Test Scope

9 Minutes
7.

Penetration Testing Lab - Penetration Testing Stages

10 Minutes
8.

Moral Penetration Warnings

3 Minutes
9.

Penetration Testing Stages 1

6 Minutes
10.

Penetration Testing Stages 2

10 Minutes
11.

Moral Penetration Stages 1

7 Minutes
12.

Moral Penetration Stages 2

7 Minutes
13.

Moral Penetration Stages 3

12 Minutes
14.

Exploiting Web Application Vulnerabilities

7 Minutes
15.

Some Types of Web Attacks

6 Minutes
16.

Attacking Wireless Networks 1

4 Minutes
17.

Attacking Wireless Networks 2

9 Minutes
18.

Securing Wireless Networks

2 Minutes
19.

Systems with Learning Vulnerabilities

2 Minutes
1.

Cybersecurity Controls (Administrative Control)

11 Minutes
2.

Cybersecurity Controls (Physical-Technical Controls) & Cybersecurity Controls Functions

13 Minutes
3.

Cybersecurity Technical Control 1

13 Minutes
4.

Cybersecurity Technical Control 2

10 Minutes
5.

Cybersecurity Technical Control 3

6 Minutes
6.

Cybersecurity Technical Control 4

10 Minutes
1.

Practical Application 1

15 Minutes
2.

Practical Application 2

10 Minutes
3.

Practical Application 3

8 Minutes
4.

Practical Application 4

8 Minutes
5.

Practical Application 5

3 Minutes
6.

Practical Application 6 (Vulnerability Detection through Nessus)

8 Minutes
7.

Practical Application 7 (Vulnerability Detection through Nessus)

13 Minutes
8.

Practical Application 8 (DVWA)

11 Minutes

About this course

In this track, you will learn the cybersecurity fundamentals, the basics of networking, the fields of cybersecurity, basic concepts of cybersecurity, how to create security objects, implement security services, and identify and assess different types of risks. You will also learn about cybersecurity controls, the concept of ethical hacking, infrastructure services, and secure infrastructure engineering. Also, through this track, you will learn about hacking techniques, how to handle and respond to various incidents, and malware reverses engineering techniques.

Course requirements and prerequisites

Graduate from Engineering or Computer Science

Strong problem solving skills

Detail-oriented

Mentor

Looking for help?