Rating 3.65 out of 5 (26 ratings in Udemy)
What you'll learn- Have a comprehensive insight regarding information technologies security
- Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
- Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
- Security benchmark (Black-box and white-box approach to exploit and secure a system)
- Formulary hacks (Code a vulnerable form, exploit and …
Rating 3.65 out of 5 (26 ratings in Udemy)
What you'll learn- Have a comprehensive insight regarding information technologies security
- Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
- Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
- Security benchmark (Black-box and white-box approach to exploit and secure a system)
- Formulary hacks (Code a vulnerable form, exploit and secure it)
- Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
- Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.
DescriptionThis curse sums up more than 10 years working on ITand the content ofa master degree in information technologies security.
The topics are:
CIA triad, types of attacks and security mechanisms
Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
Security benchmark (Black-box and white-box approach to exploit and secure a system)
Formulary hacks (Code a vulnerable form, exploitand secure it)
Security in email (PGP) and web servers (X.509)
Network firewall with Snort integration
Remote security analysis and assessment
Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.
Even if you are already a system administrator or a newbie you are most likely to find something new, as Idid previously to start this.
If you have any question or doubt just send me a message.
All questions and feedback will have a response within 24 hours, sign up today and start learning now.
This course is constantly reviewed and updated with new lessons.
More information available at hackademy tk