arrow_back
Back
lock
Complete Course Preview
lock
Module 1: Cybersecurity In Enterprise
lock
Practicality of Security in Businesses
lock
Cybersecurity Environment Today
lock
CIA Triad and it’s Applications
lock
Vulnerability, Risk and Threats
lock
Overview to Enterprise Framework
lock
Module 2: Cyber Threats and Attack Vectors
lock
Types of different Cyber attacks on business
lock
Network and System Based Attacks
lock
Mobile, DDOS, Wireless attacks
lock
Cloud based risks and threats
lock
Injection vectors
lock
Module 3: Email Security and Setup
lock
Overview of Email attacks and Security
lock
SPF, DKIM & DMARC Records
lock
Setting up SPF
lock
Setting Up DKIM
lock
Templates vectors and attacks
lock
Module 4: Real-Time Data Breach Track
lock
Understanding Intrusion Techniques
lock
How Hackers Hack in Companies
lock
Setting up Honeypot Trap
lock
Preparing Attack and Defense
lock
Maltego : Practical Approach to Tracking
lock
Module 5: Detecting and Mitigating Threats
lock
Overview of Firewalls and Solutions
lock
Types of Firewalls and Importance
lock
Windows and Linux Firewall Configuration
lock
Setting own Intrusion Detection System
lock
Intrusion Prevention Systems
lock
Module 6: Security Operations and SIEM
lock
System Information and Event Management
lock
Splunk Analyst 101
lock
Threat Monitoring using Splunk
lock
Splunk hands on Labs
lock
Qradar Installation and Setup
lock
Module 7: Mitre Att&ck Framework
lock
Cyber Kill Chain
lock
MITRE ATT&CK Framework
lock
Enterprise Matrix with ATT&CK Navigator
lock
Effective Purple Teaming
lock
Mapping CTI with ATT&CK
Preview - Certified Enterprise Security Officer (LIVE)
Discuss (
0
)
navigate_before
Previous
Next
navigate_next