MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

IT Security: Hacking Tips & Techniques for IT Professionals

Course Summary

Best Hacking Training Program you can participate. Covers CISSP and CEH program. Get Hacking Academy Certificate


  • +

    Course Syllabus

    • Before you start - introduction
      • Examination - your voucher
      • Certificate - see how it looks
    • Security Policies
      • Security Policies - Introduction
      • Threat Modelling and Classification
      • Threat Modelling and Classification - notes for the examination
    • Risk Managment
      • Risk Managment - Introduction
      • Attack Methodologies
      • Attack Methodologies - notes for the examination
      • Risk Assessment
      • Risk Assessment - notes for the examination
      • Social Engineering and Rogue Software
      • Social Engineering and Rogue Software - notes for the examination
    • Defence in Depth
      • Defence in Depth - Introduction
      • The Defence in Depth Model
      • The Defence in Depth Model - notes for the examination
      • Immutable Laws of Security
      • Immutable Laws of Security - notes for the examination
    • Disaster Recovery
      • Disaster Recovery - Introducation
      • How to reduce losses
      • How to reduce losses - notes for the examination
    • Application Security
      • Application Security - Introduction
      • Application Attacks
      • Application Attacks - notes for the examination
      • Program Security Assessment
      • Program Security Assessment - notes for the examination
    • Application Security - Configuration and Managment
      • Configuration and Managment - Introduction
      • How to protect users without interrupting their work
      • How to protect users without interrupting their work - notes for the examination
    • Cryptography
      • Cryptography - Introduction
      • Symmetric and Asymmetric Ciphers
      • Symmetric and Asymmetric Ciphers - notes for the examination
    • Public Key Infrastructure
      • Public Key Infrastructure - Introduction
      • Public Key Infrastructure - Trust but verify
      • Public Key Infrastructure - Trust but verify - notes for the examination
    • Prepare yourself for the examination
      • Answer sample questions which you can find during the examination


Course Fee:
USD 99

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top