Intoduction To Cybersecurity Via Penetration Testing

USD 90.00 USD 45.00

50% Discount

KESHINRO GBENGA

Language of video: EN (English)

Add To Cart
This course includes:

02h 43m on-demand videos

0 downloadable resources

Full lifetime access

Certificate of completion

Level:
Intermediate
teaching method:
A Virtual Production Environment(simulation/emulation of an actual production environment) will be employed(via vitualization), and knowledge will be conveyed via videos, and parctical v-lab(virtual lab) sessions, if required.
What are We Going to Teach:
  • Introduce participants to Cybersecurity via a Penetration Testing-based approach
  • Introduce participants to the various tools(and methodologies) employed in such an approach
Course objective:
  • To give participants comprehensive insight into the paradigm of Cybersecurity via Penetration Testing.
Course prerequisites:
  • Significant access time to a Personal Computer, and an internet connection

Description :

The course is designed to give participants an introduction to cybersecurity(via penetration testing), with the activity being performed in a controlled, and simulated, virtual production environment, and carried out from a (supposedly) independently employed third-party's linux-based perspective. All appliances, servers, and systems have been simulated with virtualization, giving a what-you-see is what-you-get experience. The configurations are carried out real-time, and are an exact depiction of what you would meet/experience in the IT industry, with regards to practices employed by Small-to-Medium Enterprises, and Large-to-Medium Enterprises alike. Participants can also expect comprehensive laboratory practice exercises, and can also opt for PRIVATE lab coaching sessions, which will be conducted in the same virtual production environments, if need be. This is one of the most comprehensive cybersecurity courses participants will undergo, and it is expected they possess(or, at least, have access to) advanced IT-related knowledge-base(and expertise, if need be). Participants can be sure the level of understanding and comprehension that will be conveyed after the course has been completed, will be satisfactory. It is hoped participants will have significant access time to a Personal Computer, and an internet connection, as this will significantly enable them to perform ANY additional research that may be required, in order for them to get the best out of the course.  With this level of understanding/comprehension, participants will therefore confidently be able to become unrivaled assets to the respective organisations they are able to achieve gainful employment in/with. The course can also be of significant benefit to participants who want to write professional exams such as OSCP/OSED.

John Doe

KESHINRO GBENGA

Click for more
Nigeria

Please visit the links below:

 

https://www.linkedin.com/feed/update/urn:li:activity:7169522735839076352/?utm_source=share&utm_medium=member_desktop

 

https://www.youtube.com/watch?v=M2tsbOGmWas&feature=youtu.be

Click for more

Average Rating :

  • 5
    0
  • 4
    0
  • 3
    0
  • 2
    0
  • 1
    0

0

0 Rating

0 Review

Course Content : Expand all sections

  • 1 sections
  • 9 lectures
  • 02h 43m total length

Class Introduction

Information Gathering

Information Gathering

Information Gathering

Target And Assets Identification In A Production Environment

Launch Attack Vectors

Launch Attack Vectors

00:01:57

Closing Comments

00:11:40

An Actual Breach(Without User Intervention) on a Windows 7 machine

More Courses Like This :