There are three pillars to effectively secure corporate’s information and establish a long-lasting Information Technology Security. Unfortunately, many top managers are not aware of the importance of cyber security, and many IT managers assume that IT security is only about firewalls and antivirus. However, there are three keys to proper IT security in any organization, […]
This course will equip the students with necessary knowledge and skills about two fundamental systems in cyber security, which are Security Information and Event Management (SIEM) and Intrusion Detection System (IDS). The first centrally collects, correlates, and analyzes logs from different nodes in the network, while the latter constantly monitors network traffic for sings of intrusions.
The course covers advanced techniques spanning the lifecycle of a penetration test from active probing to post exploitation. The students will first learn advanced network mapping and port scanning techniques. Then, they will know how to search, discover, analyze, and assess existing vulnerabilities.
This course covers the basic psychology behind social engineering along with the tactics, techniques, and tricks employed for a successful social engineering attack. The student will learn how to develop their own custom Trojan that evades Antivirus, and how to hide it inside a Microsoft Word document which will be sent through phishing emails.