Ethical Hacking techniques and Networks Security ( 2023 ), available in udemy

Author: Hackademy _
Provided by udemy
Certificate Available
paid Course
video Course
advanced Level

Desciption

Get to know the ins and outs of cyber security and industry best practices to configure and secure IT networks.,
  • Have a comprehensive insight regarding information technologies security
  • Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
  • Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
  • Security benchmark (Black-box and white-box approach to exploit and secure a system)
  • Formulary hacks (Code a vulnerable form, exploit and secure it)
  • Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
  • Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.
  • ,

    This curse sums up more than 10 years working on IT and the content of a master degree in information technologies security. 
    The topics are:

    • CIA triad, types of attacks and security mechanisms

    • Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)

    • Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)

    • Security benchmark (Black-box and white-box approach to exploit and secure a system)

    • Formulary hacks (Code a vulnerable form, exploit and secure it)

    • Security in email (PGP) and web servers (X.509)

    • Network firewall with Snort integration

    • Remote security analysis and assessment

    • Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks) 

    • Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand. 

    Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.
    If you have any question or doubt just send me a message.

    All questions and feedback will have a response within 24 hours, sign up today and start learning now.

    You will also learn how use most of Google's full capacities, use other search engines to fetch sensitive information and validate if credentials are compromised. Besides this you will learn how to setup a phishing attack website in order to get sensitive information by cloning websites such as Google's, Facebook, LinkedIn, etc and you will also learn how to setup a local fake WiFi access point to get users credentials, among other useful information.

    This course is constantly reviewed and updated with new lessons

    Last update: Jun 2023