->
Oreilly - Information Security - 9781788477741
Oreilly - Information Security
by Sunil Gupta | Released February 2018 | ISBN: 9781788477741


Build your own Information Security Framework and become a secure computer userAbout This VideoLearn to build your own information security framework, best-fit for your organizationBuild on the concepts of threat modelling, incidence response and security analysisPractical approach towards strengthening your security frameworkIn DetailInformation security mechanism is one of the most crucial factor for any organization. Important assets of organization demand a proper risk management and threat model for security and hence, information security concepts are gaining a lot of traction. This course will initially cover the concept of information security and software installations process. It will then move on to modules like threat modelling, risk management and mitigation.This Course covers the network and web scanning . Later in the course it teaches how to use Kali Linux for ethical hacking, it will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks and have some hands-on experience. It will also cover concepts of incident response system, information rights management and so on. It will then guide you towards building your own information security framework best fit for your organization.At the end of this course, you will be well versed with all the factors involved with information security which would help you build a security framework which will be perfect fit for your organizational requirement Show and hide more
  1. Chapter 1 : Information Security Vectors, Hacking and Controls
    • The Course Overview 00:02:37
    • Elements of Information Security 00:04:18
    • Top Information Security Attacks 00:06:03
    • Threat Categories and Host Based Attacks 00:06:36
    • Hacking and its Types 00:05:05
    • Exploring VAPT (Vulnerability Assessment and Penetration Testing) 00:04:34
  2. Chapter 2 : Information Security Controls
    • Threat Modeling and Security Policies 00:06:36
    • Incident Management 00:08:04
  3. Chapter 3 : Installation of Virtual Operating System
    • Exploring Kali Linux OS and VMware 00:08:27
    • Installation Process of Virtual Machines 00:13:57
  4. Chapter 4 : Network and Web Application Scanning in Organization
    • IP Scanning and Port Scanning Process 00:09:48
    • Network Vulnerability Scanning 00:13:59
    • Acunetix Web Vulnerability Scanner 00:11:15
    • WordPress Website Scanning 00:08:21
  5. Chapter 5 : Password Cracking Techniques
    • Installing FTP Server in Windows 00:07:52
    • Cracking Passwords Using Kali Linux 00:09:13
  6. Chapter 6 : Network Pentesting using Metasploit
    • Metasploit Framework in Kali Linux 00:06:11
    • Hacking windows7 Using Kali Linux 00:09:40
    • Exploitation Countermeasures Techniques 00:08:38
  7. Show and hide more

    Oreilly - Information Security


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 Coktum   |  

Information
Members of Guests cannot leave comments.




rss