Search
Generic filters
Topics
Certifications
Industries
Cyber Security
course information
  • The idea of Cybersecurity is an emerging topic in today’s pervasive online and digital presence.  As the cyber industry continues to expand with new positions opening, skills in demand, and the more requirement for Cybersecurity professionals
  • Cybersecurity professionals work in every size company and industry to protect organizations from data breaches and attacks. And the demand for cybersecurity certified professionals is growing at a breakneck speed. Job postings for cybersecurity positions have grown three times faster than openings for IT jobs overall.
course OBJECTIVES

At the end of the workshop, participants should be able to:

  • Understand the network functioning in real-time
  • How the data travels and stolen
  • How sniffing of the data done and how to secure it
  • Securing the infrastructure.
  • Penetration testing mechanism.
  • Open source information gathering and identify the traces
  • Wireless attacks and safe guarding
  • Performing SQL injection and gathering formation from databases
course OUTLINE

Module 1: Introduction to cyber security

  • Information security overview
  • Elements of Information Security
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts

Module 2: Foot printing and Reconnaissance

  • Foot printing Concepts
  • Foot printing through Search Engines and web services
  • Foot printing through Social Networking Sites
  • Email Foot printing
  • DNS and Network Who is Foot printing
  • Foot printing through Social Engineering

Module 3: Scanning Networks

  • Network Scanning Concept
  • Overview of Network Scanning
  • TCP Communication Flags
  • TCP/IP Communication
  • Scanning Techniques
  • Port Scanning Countermeasures

Module 4: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability-Management Life Cycle
  • Choosing a Vulnerability Assessment Tool
  • Criteria for Choosing a Vulnerability Assessment Tool

Module 5: System Hacking

  • System Hacking Concepts
  • System Hacking Goals
  • Cracking Passwords

Module 6: Malware Threats

  • Covering tracks
  • Malware Concepts
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to
  • Anti-malware software

Module 7: Hacking Web Applications

  • Web App Concepts
  • Introduction to Web Applications
  • Web Application Architecture
  • Testing for SQL Injection
  • Perform Union SQL Injection

Module 8: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Networks
  • Service Set Identifier(SSID)
  • Wi-Fi Authentication Modes
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Counter measures
CERTIFICATION

DISS CERTIFICATE

          DATE          TIME
QatarOman
17-18 May 202009:00 to 13:0010:00 to 14:00
17-18 June 202009:00 to 13:0010:00 to 14:00
15-16 July 202009:00 to 13:0010:00 to 14:00
diss-partner-logo
TESTIMONIAL

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name
Meet THE INSTRUCTORS
instructor
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

instructor2
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.