Search
Generic filters
Topics
Certifications
Industries
Cyber Security
overview
  • The idea of Cybersecurity is an emerging topic in today’s pervasive online and digital presence.  As the cyber industry continues to expand with new positions opening, skills in demand, and the more requirement for Cybersecurity professionals
  • Cybersecurity professionals work in every size company and industry to protect organizations from data breaches and attacks. And the demand for cybersecurity certified professionals is growing at a breakneck speed. Job postings for cybersecurity positions have grown three times faster than openings for IT jobs overall.
course details
COURSE DURATIONLANGUAGECERTIFICATE
2 DaysEnglishDISS Certificate of Attendance
 *Please notify us if an interpretation is required *Validity:
course benefits/ progression opportunities
course objectives

At the end of the workshop, participants should be able to:

  • Understand the network functioning in real-time
  • How the data travels and stolen
  • How sniffing of the data done and how to secure it
  • Securing the infrastructure.
  • Penetration testing mechanism.
  • Open source information gathering and identify the traces
  • Wireless attacks and safe guarding
  • Performing SQL injection and gathering formation from databases
course outline
Module 1: Introduction to CybersecurityModule 2: Footprinting and ReconnaissanceModule 3: Scanning NetworksModule 4: Vulnerability Analysis
  • Information security overview
  • Elements of Information Security
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Footprinting Concepts
  • Footprinting through Search Engines and web services
  • Footprinting through Social Networking Sites
  • Email Footprinting
  • DNS and Network Who is Footprinting
  • Footprinting through Social Engineering
  • Network Scanning Concept
  • Overview of Network Scanning
  • TCP Communication Flags
  • TCP/IP Communication
  • Scanning Techniques
  • Port Scanning Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability-Management Life Cycle
  • Choosing a Vulnerability Assessment Tool
  • Criteria for Choosing a Vulnerability Assessment Tool
Module 5: System HackingModule 6: Malware ThreatsModule 7: Hacking Web ApplicationsModule 8: Hacking Wireless Networks
  • System Hacking Concepts
  • System Hacking Goals
  • Cracking Passwords
  • Covering tracks
  • Malware Concepts
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to
  • Anti-malware software
  • Web App Concepts
  • Introduction to Web Applications
  • Web Application Architecture
  • Testing for SQL Injection
  • Perform Union SQL Injection
  • Wireless Concepts
  • Wireless Networks
  • Service Set Identifier(SSID)
  • Wi-Fi Authentication Modes
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Countermeasures
COURSE TYPE: WEBINAR
DATETIME
14 Oct – 15 Oct 202009:00 – 13:30 (QATAR)
10:00 – 14:30 (OMAN)
11 Nov – 12 Nov 202009:00 – 13:30 (QATAR)
10:00 – 14:30 (OMAN)
9 Dec – 10 Dec 202009:00 – 13:30 (QATAR)
10:00 – 14:30 (OMAN)
TESTIMONIAL

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name
Meet THE INSTRUCTORS
instructor
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

instructor2
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Related Courses