01 - Introduction to System Security

  • Internet Crime Current Report: IC3
  • Data Breach Investigations Report
  • Types of Data Stolen From the Organizations
  • Essential Terminologies
  • Elements of Information Security
  • Authenticity and Non-Repudiation
  • The Security, Functionality, and Usability Triangle
  • Security Challenges
  • Effects of Hacking
    • Effects of Hacking on Business
  • Who is a Hacker?
  • Hacker Classes
  • Hacktivism
  • What Does a Hacker Do?
  • Phase 1 - Reconnaissance
    • Reconnaissance Types
  • Phase 2 - Scanning
  • Phase 3 – Gaining Access
  • Phase 4 – Maintaining Access
  • Phase 5 – Covering Tracks
  • Types of Attacks on a System
    • Operating System Attacks
    • Application-Level Attacks
    • Shrink Wrap Code Attacks
    • Misconfiguration Attacks
  • Why Ethical Hacking is Necessary?
  • Defense in Depth
  • Scope and Limitations of System Security
  • What Do System Security Do?
  • Skills of an Ethical Hacker
  • Vulnerability Research
  • Vulnerability Research Websites
  • What is Penetration Testing?
  • Why Penetration Testing?
  • Penetration Testing Methodology