Information Security Training network security
- Anti-virus and anti-spyware.
- Firewall, to block unauthorized access to your network.
- Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks.
- Virtual Private Networks (VPNs), to provide secure remote access
- Viruses, worms, and Trojan horses.
- Spyware and adware.
- Zero-day attacks, also called zero-hour attacks.
- Hacker attacks.
- Denial of service attacks.
- Data interception and theft.
- Identity theft.
- Network Mapping with NMAP.
- Reconnaissance & Google Hacking.
- Exploit Testing with METASPLOIT FRAMEWORK.
- Security Essentials (GSEC Curriculum).
- Penetration Testing (GPEN Curriculum).
- Effective Vulnerability Scan with NESSUS.
TRAINING AND AWARENESS ON
Penetration Testing (GPEN Curriculum)
Penetration Testing or Pen-testing is a systematic process to simulate or sometimes perform a real-time logical attack on a system and look for its security weaknesses and potential attack vectors.
GIAC Certified Penetration Tester (GPEN) is an Information Security Certification for Network, Application & System Security: Assessments, Penetration Testing, Auditing, Forensics etcView Details