Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking and Networks Security

Get to know the ins and outs of cyber security and industry best practices to configure and secure IT networks.
3.7
3.7/5
(26 reviews)
1,088 students
Created by

8.7

CourseMarks Score®

9.6

Freshness

6.5

Feedback

9.3

Content

Platform: Udemy
Video: 8h 40m
Language: English
Next start: On Demand

Table of contents

Description

This curse sums up more than 10 years working on IT and the content of a master degree in information technologies security. 
The topics are:

•CIA triad, types of attacks and security mechanisms
•Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
•Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
•Security benchmark (Black-box and white-box approach to exploit and secure a system)
•Formulary hacks (Code a vulnerable form, exploit and secure it)
•Security in email (PGP) and web servers (X.509)
•Network firewall with Snort integration
•Remote security analysis and assessment
•Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks) 
•Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand. 
Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.
If you have any question or doubt just send me a message.
All questions and feedback will have a response within 24 hours, sign up today and start learning now.

This course is constantly reviewed and updated with new lessons.
More information available at hackademy tk

You will learn

✓ Have a comprehensive insight regarding information technologies security
✓ Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
✓ Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
✓ Security benchmark (Black-box and white-box approach to exploit and secure a system)
✓ Formulary hacks (Code a vulnerable form, exploit and secure it)
✓ Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
✓ Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.

Requirements

• You must be comfortable using your PC and some programing knowledge is advisable
• All the software we are using is Open Source

This course is for

• From the newbie to the more experienced system administrator you most likely will learn something
Learn, explore and share.
Courses range from WordPress, virtual reality, apps coding and other information technologies domains.
I have been teaching IT since 2007 and besides having a master degree in multimedia I like to share my knowledge and learn from my students to improve with each new course 
Sharing my IT passion with you is the main goal, check out the positive feedbacks and I hope to have one from you in the future.
Start learning now, sign up today.
Browse all courses by on Coursemarks.
Platform: Udemy
Video: 8h 40m
Language: English
Next start: On Demand

Students are also interested in