Cyber Security

Cyber Security Essentials

Cyber Security Essentials
cyber-security600#de9221 ‌Cyber Security (Basic)Cyber Security (Advanced) SkillsFuture Credit Approved Course Introduction Cybersecurity refers to the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance...

Read more ...

Secure Coding in Java

Secure Coding in Java
SkillsFuture Credit Approved Course Introduction Learn how to build secure software in Java with this course. Gain insights into common programming errors in Java and learn how these errors can lead to exploitation. Master security issues that are relevant to the Java programming languages and associated libraries. Furthermore, learn about common programming errors that lead...

Read more ...

Ethical Hacking Network Intrusion Investigations and Forensic Analysis

Ethical Hacking Network Intrusion Investigations and Forensic Analysis
This class will provide the students with a unique perspective on network intrusion investigations and analysis. Students will begin the course by compromising a system ("ethical hacking") leveraging techniques that have been seen in the wild by attackers. Once in, they will walk through the stages of an intrusion, from compromise to entrenchment, and exfiltration...

Read more ...

Developing Defensible Web Applications

Developing Defensible Web Applications
Introduction This class first demonstrates to developers how attackers create strategies to compromise applications in order to help students “think like an attacker.” The class then moves into demonstrating how the Open Web Application Security Project (OWASP) provides developers with the tools to successfully develop applications that are difficult or near impossible to hack. This...

Read more ...

Security Awareness

Security Awareness
Introduction Learn how to identify and apply security techniques in this course.Upon successful completion of this course, students will be able to: describe the importance of securing information.identify the different ways to guard yourself against social engineering exploits.describe the security practices related to computers, mobile devices, networks, and the Internet.maintain the security of the files...

Read more ...

Hacking, Penetration Testing and Defensive Countermeasures

Hacking, Penetration Testing and Defensive Countermeasures
Introduction Hacking, Penetration Testing and Defensive Countermeasures is a hands-on, intensive, workshop immersing students in the methodologies and application of hacking concepts, techniques, and tools. The hacking methodology used in this class includes: footprinting, scanning, enumeration, exploitation, and post-exploitation. Countermeasures to mitigate the various hacking techniques are emphasized. When students complete the class they will...

Read more ...

Networking and Security Administration of Red Hat Linux 5

Networking and Security Administration of Red Hat Linux 5
Introduction You have performed basic system administration and managed system services. But as a network administrator, you will be required to manage security and performance of multiple systems on a network. In the Networking and Security Administration of Red Hat Linux 5 course, you will implement system security and user authentication between hosts using Red...

Read more ...

Mobile Devices Ethical Hacking

Mobile Devices Ethical Hacking
Introduction The objective of the course is to provide an understanding of the fundamental risks of mobility, as well as those involving Wi-Fi and mobility infrastructure. It presents real world use cases on how devices can be compromised using industry attack tools and engages attendees in solution analysis methodology designed to protect against such vulnerabilities....

Read more ...

Secure Coding with PHP

Secure Coding with PHP
Introduction Understand basic concepts of security, IT security and secure codingLearn Web vulnerabilities beyond OWASP Top Ten and know how to avoid themLearn to use various security features of PHPGet information about some recent vulnerabilities of the PHP frameworkLearn about typical coding mistakes and how to avoid themGet practical knowledge in using security testing toolsGet...

Read more ...

Virtualization and Private Cloud Security

Virtualization and Private Cloud Security
Introduction We are well aware that virtualization has been widely implemented, however, there are questions regarding adequate considerations for security threats, known or perceived. It appears that many organizations rest on superior security at the physical layer for a secure virtual layer. This is due in part to an organization that is not aware of...

Read more ...