Column
Column

Course

Cyber Safe

The first step to the world of cyber security. This gives an insight into the frauds happening around and how to defend your family, friends, and yourself from cyber criminals. 10 hours workshop provided by Xplore IT Corp can give you the skill and knowledge to safeguard your private and confidential stuff from digital thieves.

The purpose of this program is to provide individuals with the necessary knowledge and skills to protect their information assets. This class will immerse candidates into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering.
More importantly, the skills learned from the class help candidates take the necessary steps to mitigate their security exposure.

TOPICS TO BE COVERED

  • Information Security Overview
  • Information Security Threats and Attack Vector
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Securing Operating Systems
  • Malware and Antivirus
  • Internet Security
  • Security on Social Networking Sites
  • Securing Email Communications
  • Securing Mobile Devices
  • Securing the Cloud
  • Securing Network Connections
  • Data Backup and Disaster Recovery
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website & Email Footprinting
  • Competitive Intelligence
  • Whois & DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Pen Testing
  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Pen Testing
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Vulnerability Assessment Concepts & Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

DURATION

The duration of this workshop will be two consecutive days, with 6-7 hour session each day in a total of 12-14 hours.

CERTIFICATION POLICY

Certificate of Merit for all the candidates.
At the end of this certificate course, Candidates can obtain their Certified CyberSAFE certification given by CERTNEXUS by completing the Certified CyberSAFE credential process on the CHOICE platform.

ELIGIBILITY

Anyone interested, can join this course.

Request a call back

    This will close in 0 seconds

    Enquiry Form

      Powered by