What Will You Learn
- Key Issues Plaguing The Information Security, Network Security, And Computer Forensics
- Fundamentals Of Networks And Various Components Of The OSI And TCP/IP Model
- Various Network Security Protocols
- Various Types Of Information Security Threats And Attacks, And Their Countermeasures
- Social Engineering Techniques, Identify Theft, And Social Engineering Countermeasures
- Different Stages Of Hacking Cycle
- Identification, Authentication, And Authorization Concepts
- Different Types Of Cryptography Ciphers, Public Key Infrastructure (PKI), Cryptography Attacks, And Cryptanalysis Tools
- Fundamentals Of Firewall, Techniques For Bypassing Firewall, And Firewall Technologies Such As Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, And Honeypot
- Fundamentals Of IDS And IDS Evasion Techniques
- Data Backup Techniques And VPN Security
- Wireless Encryption, Wireless Threats, Wireless Hacking Tools, And Wi-Fi Security
- Different Types Of Web Server And Web Application Attacks, And Countermeasures
- Fundamentals Of Ethical Hacking And Pen Testing
- Incident Handling And Response Process
- Cyber-Crime And Computer Forensics Investigation Methodology
- Different Types Of Digital Evidence And Digital Evidence Examination Process
- Different Type Of File Systems And Their Comparison (Based On Limit And Features)
- Gathering Volatile And Non-Volatile Information From Windows And Network Forensics Analysis Mechanism
- Steganography And Its Techniques
- Different Types Of Log Capturing, Time Synchronization, And Log Capturing Tools
- E-Mails Tracking And E-Mail Crimes Investigation
- Writing Investigation Report