Advanced Cyber Security Training: Network Security

This course is being presented by Jeff Minakata. Jeff has over 19 years of experience of working within the IT industry as an ethical hacker. He holds different qualifications, including network certifications and engineering and security certifications. Jeff is also an online educator for ethical hacking, network security, open-source intelligence, and building games.

Intermediate 0(0 Ratings) 0 Students enrolled
Created by Skill Central Last updated Thu, 08-Jul-2021 English
What will i learn?
  • describe the importance of protecting networks from attacks
  • identify risks to a network
  • describe DDOS attacks.
  • describe the five steps used by hackers to target an individual.
  • identify how to protect a network at each step of a hacker’s five steps.
  • identify the role of social engineering in opening a network to vulnerability.
  • identify the physical vulnerability in a network’s security.
  • understand Man in the Middle attacks

Curriculum for this course
26 Lessons 02:28:57 Hours
Introduction to Network Threats
5 Lessons 00:26:26 Hours
  • Yes, You Are a Target! 00:05:07
  • Typical Attacks Against a Network 00:05:50
  • Typical Attacks Against a Network Continued 00:03:20
  • DOS and DDOS Attacks: Theory 00:05:00
  • DOS and DDOS Attacks: Demonstration and Mitigation 00:07:09
Physical Attacks and Man in the Middle Attacks
7 Lessons 00:42:15 Hours
  • Scanning Tools and Methodology Continued 00:06:15
  • Social Engineering: Examples Continued 00:04:28
  • Social Engineering: Examples Continued 00:06:11
  • A Malicious Hacker's Methodology 00:07:16
  • Scanning Tools and Methodology 00:04:20
  • Social Engineering: Examples 00:06:40
  • What Can We Learn from Malicious Hackers? 00:07:05
Social Engineering
5 Lessons 00:24:36 Hours
  • Physical Attacks: Specific USB Attacks 00:04:00
  • Physical Attacks: Identifying Vulnerabilities 00:06:36
  • Physical Attacks: How to Protect Your Network 00:01:34
  • Getting Sneaky: Using DVWA to identify MiTM attacks 00:06:13
  • ExploitDB 00:06:13
Securing Your Network Through Your Users
4 Lessons 00:26:29 Hours
  • Why Employee Training Is Important and Some Tips 00:06:32
  • What Is an Insider Threat? 00:07:01
  • Why You Need to Strike a Balance Between Security and Ease of Use 00:06:00
  • Employee Reporting 00:06:56
Securing Your Machine: Common Ways in for Hackers
3 Lessons 00:18:45 Hours
  • Antivirus and Console Tools 00:04:45
  • Patching Everything 00:07:02
  • Scareware 00:06:58
Securing Your Machine: Changes You Should Make
2 Lessons 00:10:26 Hours
  • Application Reduction: Why You Should Slim It Down 00:04:10
  • Limiting User Rights 00:06:16
Logs and Auditing: Monitoring Software
0 Lessons 00:00:00 Hours
Logs and Auditing: IP Addresses
0 Lessons 00:00:00 Hours
Phishing and Spear Phishing
0 Lessons 00:00:00 Hours
Red Team and Blue Team Approach
0 Lessons 00:00:00 Hours
Tracking a Hacker (OSINT)
0 Lessons 00:00:00 Hours
Recovering from an Attack
0 Lessons 00:00:00 Hours
Requirements
+ View more
Description

This course contains several practical demonstrations for you to follow along with. The best way to learn is by doing. We would like you to engage with what has been demonstrated or discussed, we will indicate this with ‘over to you’.     

+ View more
Other related courses
00:00:00 Hours
Updated Mon, 28-Jun-2021
0 0 ₦5,000
00:00:00 Hours
Updated Mon, 28-Jun-2021
0 0 ₦5,000
00:00:00 Hours
0 3 ₦5,000
About the instructor
  • 5 Reviews
  • 158 Students
  • 96 Courses
+ View more

 

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
₦10,000
Buy now
Includes:
  • 02:28:57 Hours On demand videos
  • 26 Lessons
  • Access on mobile and tv
  • Full lifetime access
  • Certificate of completion
  • Compare this course with another