Search this site
Embedded Files
Skip to main content
Skip to navigation
WEB
_______________
Security
Operations Security
Telecommunications & Network Security
Business Continuity and Disaster Recovery Planning
Crittography
Information Security Governance and Risk Management
Security Architecture and Design
Access Control
Physical Security
Software Development Security
Legal, Regulations, Investigations and Compliance
Privacy
Awareness
_______________
Lectures
Information Gathering
OSINT: Fonti e Notizie
OSINT: Ciclo di intelligence
OSINT: Tecnologia
Agile Development
Big Data
Cloud Computing Introduction
Cloud Computing
Cloud Computing Examples
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Cloud Scenario
Labs
Google Search
1 - Introduction
2 - Interpreting results
3 - Advanced techniques
4 - Find facts faster
5 - Checking facts
6 - Putting it all together
Security Expert
01 - Introduction to System Security
02 - Footprinting and Reconnaissance
I. Network Route Trace Using Path Analyzer Pro
II. Mirroring Websites Using the HTTrack Web Site Copier Tool
III. Extracting a Company’s Data Using Web Data Extractor
03 - Scanning Networks
04 - Enumeration
05 - System Hacking
06 - Trojans and Backdoors
07 - Viruses and Worms
08 - Sniffing
09 - Social Engineering
10 - Denial of Service
11 - Session Hijacking
12 - Hijacking Webservers
13 - Hacking Web Applications
14 - SQL Injection
15 - Hacking Wireless Networks
16 - Hacking Mobile Platforms
17 - Evading IDS, Firewalls, and Honeypots
18 - Buffer Overflow
19 - Cryptography
20 - Penetration Testing
Cyber Scenarios
WEB
Information Security Governance and Risk Management
AGENDA
Roles of individuals in securing information assets
Planning and Protect organization’s information assets
Policies management views
Standards and procedures, to security administration
Security awareness training
Data classification
Risk management practices and tools
Evaluate company assets
Identify and assess threats and vulnerabilities
Calculate single and annual loss expectancy
Ethical and regulatory requirements to protect privacy
Data protection controls
Preventing unauthorized access
Audit system records and event logs
Best practices for system security administration
Report abuse
Report abuse