Advanced Security Assessment, Threat Intelligence And Exploitations

4 out of 5
6 reviews
Information Security Assessment

ISMS Project Scope
  • Assessing Business Needs
  • Assessing Internal, External and Third-party Issues
  • Statement of Applicability (SOA)
Risk Assessment and Management
  • Risk Identification and Assessment
  • Sessions with Organization Teams
  • Risk Management Approach
Audit Program
  • Internal Audit Team and conduct Internal Audit
  • Closing the Findings and Gaps
  • Improvement Management and Planning
Vulnerability Management

Understanding of Vulnerability Management
  • CIA Triad – Confidentiality, Integrity and Availability
  • Vulnerability Management Life Cycle
  • Relationship of Vulnerability Management with Risk Management
Vulnerability Management Implementation
  • Vulnerability Management Program
  • Asset and Change Management
  • Data Sources
Vulnerability Management Tools
  • Vulnerability Scanners
  • Integration and Automation of Vulnerabilities
  • Reporting and Maintenance
Cyber Security threat Intelligence

Understanding of Threat Intelligence
  • Types of Threat Intelligence
  • Threat Intelligence Lifecycle
  • Sources of Threat Intelligence Management
Threat Intelligence Program and Use Cases
  • Use Cases for SOC
  • Use Cases for Incident Response
  • Use Cases for Vulnerability Management
  • Use Cases for CISO
System Exploitation

Understanding of Exploitation
  • System Internals
  • Security Development Lifecycle (SDL)
  • Threat Modeling
Windows Exploitation
  • Windows Architecture
  • Windows Shellcode
  • Windows Overflows
Linux Exploitation
  • Linux Architecture
  • Stack and Heap Overflows
  • Shellcode
Exploit Development
  • Windows Exploit Development
  • Linux Exploit Development
Detailed and Executive Reporting Techniques

Detailed and Executive Reporting Techniques
  • Layout and Components
  • Technical Report
  • Executive Report

Starting Course

Nvidia New Technologies Slides
Quiz: Mobile / Native Apps
20 questions

After Intro

Realistic Graphic on UE4
Volta GPU for optimization.
Deep Learning
Faq Content 1
Faq Content 2

Productivity Hacks to Get More Done in 2018

— 28 February 2017

  1. Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
  2. Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
  3. Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!

4 out of 5
6 Ratings

Detailed Rating

Stars 5
Stars 4
Stars 3
Stars 2
Stars 1

{{ review.user }}

{{ review.time }}

Show more
Please, login to leave a review
Get course
Enrolled: 0 students
Duration: 40 hours
Lectures: 4

Working hours

Monday 9:30 am - 6.00 pm
Tuesday 9:30 am - 6.00 pm
Wednesday 9:30 am - 6.00 pm
Thursday 9:30 am - 6.00 pm
Friday 9:30 am - 5.00 pm
Saturday Closed
Sunday Closed
This website uses cookies and asks your personal data to enhance your browsing experience.