HOME > IT & Software > Threat and Vulnerability Assessment for Enterprises

Threat and Vulnerability Assessment for Enterprises

SynopsisThreat and Vulnerability Assessment for Enterprises, availabl...
Threat and Vulnerability Assessment for Enterprises  No.1

Threat and Vulnerability Assessment for Enterprises, available at $34.99, has an average rating of 3.7, with 62 lectures, based on 54 reviews, and has 358 subscribers.

You will learn about Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises. Understand the principles of enterprise-level security and the elements of effective security policies. Install and configure network and host-based security technologies. Describe the standards and products used to enforce security on web and application technologies. Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery. Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises. This course is ideal for individuals who are This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators. It is particularly useful for This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.

Enroll now: Threat and Vulnerability Assessment for Enterprises

Summary

Title: Threat and Vulnerability Assessment for Enterprises

Price: $34.99

Average Rating: 3.7

Number of Lectures: 62

Number of Published Lectures: 62

Number of Curriculum Items: 62

Number of Published Curriculum Objects: 62

Original Price: $109.99

Quality Status: approved

Status: Live

What You Will Learn

  • Identify strategies developed by cyber adversaries to attack networks and hosts along with the countermeasures deployed to defend them by enterprises.
  • Understand the principles of enterprise-level security and the elements of effective security policies.
  • Install and configure network and host-based security technologies.
  • Describe the standards and products used to enforce security on web and application technologies.
  • Identify strategies for ensuring business continuity, fault tolerance, and disaster recovery.
  • Implement vulnerability management planning-methods to Mitigate Cyber Attacks in enterprises.
  • Who Should Attend

  • This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.
  • Target Audiences

  • This video course is for ethical hackers, penetration testers, cyber security professionals, network engineers, web security specialists, application security experts and information security professionals, and administrators.
  • Technology continues to evolve more rapidly than ever, and the demand for enterprises to continuously update their policies is more vital than ever. No longer are attackers continuing to throw sophisticated attacks that can cripple a business (ex. Ransomware) at the largest companies. Small and medium-sized businesses are no longer safe, and in many cases after a cyber-attack, companies are rarely prepared for future incidents.

    In this course, we’ll cover threat and vulnerability management. We introduce you to the core components of comprehensive vulnerability assessment, and provide the hands-on instruction necessary to produce a vigorous defensive strategy from day one.

    The course is focused on equipping information security personnel from midsize to large organizations charged with effectively and efficiently securing a few hundred or more systems. By the end of the course, you’ll build a solid base around the entire vulnerability management process including the understanding of vulnerabilities, identifying and ranking the security issues, and recommending solutions to remediate the security issues. This process will also help to prevent security breaches.

    About The Author

    A computer and cybersecurity expert, Sunil Gupta consults in information technology with a focus on cybersecurity. He is an invited speaker for and a member of many key organizations. Sunil is a technology visionary and cyber security professional who thrives on solving complex problems. His career highlights include working with various companies, organizations, and products. His primary passion is cybersecurity, but he understands that to be successful at securing an organization, you must have a detailed understanding of networks and related fields. He is passionate about customer service and his role as a cyber security expert, and always exceeds his clients’ expectations.

    Course Curriculum

    Chapter 1: Course Introduction

    Lecture 1: The Course Overview

    Lecture 2: About the Course

    Lecture 3: How to Get most out of This course?

    Lecture 4: Cyber Security Terminologies

    Chapter 2: Lab Setup

    Lecture 1: Virtual Machine

    Lecture 2: Windows VM Installation

    Lecture 3: Kali Linux VM Installation

    Chapter 3: Open Source Intelligence Gathering

    Lecture 1: OSINT Cycle

    Lecture 2: Social Media and Geolocation Information

    Lecture 3: Network, Government, and Business Information

    Lecture 4: Dark Web Information

    Chapter 4: Network and Website Services Enumeration

    Lecture 1: Service Enumeration Overview

    Lecture 2: Nmap Port Scanner

    Lecture 3: Masscan Enumeration

    Lecture 4: Web Frontend and Backend Information

    Lecture 5: Domain information Using Recon-ng

    Lecture 6: Web Crawling Using HTTrack

    Chapter 5: Web Application Vulnerability Enumeration

    Lecture 1: Web Application Assessment Overview

    Lecture 2: Acunetix Web Vulnerability Scanner

    Lecture 3: OWASP ZAP Proxy

    Lecture 4: Burp Suite Web Analyzer

    Lecture 5: Nikto

    Lecture 6: WPScan for WordPress Scanning

    Chapter 6: Network Vulnerability Enumeration

    Lecture 1: Network Vulnerability Assessment Overview

    Lecture 2: Nmap and Zenmap

    Lecture 3: Tripwire SeureCheq Scanner

    Lecture 4: Nessus Network Vulnerability Scanner

    Lecture 5: Summary

    Chapter 7: Discovery of Major Cyber Security Vulnerabilities in Web Application

    Lecture 1: Web Application VM Lab Setup

    Lecture 2: SQL Injection Attack

    Lecture 3: Cross-Site Scripting Attack

    Lecture 4: Cross-Site Request Forgery Attack

    Lecture 5: Denial of Service Attack (DOS)

    Chapter 8: Discovery of Other Cyber Security Vulnerabilities in Websites

    Lecture 1: Buffer Overflow Attack

    Lecture 2: File Upload Attack

    Lecture 3: Insecure Cryptographic Storage

    Lecture 4: Sensitive Data Exposure

    Lecture 5: Local File Inclusion

    Lecture 6: Brute Force Attack

    Chapter 9: Discovery of Major Cyber Security Vulnerabilities in Networks

    Lecture 1: Various Server Vulnerabilities

    Lecture 2: Protocol Password Attack

    Lecture 3: Sniffing/Spoofing

    Lecture 4: Wireless Attack

    Lecture 5: Flooding Attack

    Chapter 10: Discovery of Other Cyber Security Vulnerabilities in Networks

    Lecture 1: Various System Vulnerabilities

    Lecture 2: Phishing Attack

    Lecture 3: Windows Vulnerabilities

    Lecture 4: Malware Attack to Breach Security

    Lecture 5: Browser Vulnerabilities

    Chapter 11: Triage – Security Incidents

    Lecture 1: Security Triage Overview

    Lecture 2: Types of Security Incidents

    Lecture 3: External Media Attack (USB)

    Lecture 4: Drive by Download Attack

    Lecture 5: Attrition Attack

    Lecture 6: Email Attack

    Chapter 12: Remediation of Cyber Attacks on Organizations

    Lecture 1: 7 Ways to Stop Cyber Security Attacks

    Lecture 2: Monitor Network Connections

    Lecture 3: Spoofing Attack Remediation

    Lecture 4: System Auditing Process

    Lecture 5: Identify Basic Threats

    Lecture 6: Deploy a Vulnerability Management System

    Lecture 7: Course Summary

    Instructors

  • Threat and Vulnerability Assessment for Enterprises  No.2
    Packt Publishing
    Tech Knowledge in Motion
  • Rating Distribution

  • 1 stars: 5 votes
  • 2 stars: 2 votes
  • 3 stars: 15 votes
  • 4 stars: 18 votes
  • 5 stars: 14 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!