3.6  8 reviews on Udemy

Information Security

Build your own Information Security Framework and become a secure computer user
Course from Udemy
 26 students enrolled
 en
Learn Information Security Management
Tackle various security threats
Become a secured computer user
Learn Network Penetration Testing
Create virtual environment on Windows and Linux.
Evaluate the security of an organization

Information security mechanism is one of the most crucial factor for any organization. Important assets of organization demand a proper risk management and threat model for security and hence, information security concepts are gaining a lot of traction. This course will initially cover the concept of information security and software installations process. It will then move on to modules like threat modelling, risk management and mitigation.
This Course covers the network and web scanning . Later in the course it teaches how to use Kali Linux for ethical hacking, it will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks and have some hands-on experience. It will also cover concepts of incident response system, information rights management and so on. It will then guide you towards building your own information security framework best fit for your organization.
At the end of this course, you will be well versed with all the factors involved with information security which would help you build a security framework which will be perfect fit for your organizational requirement

About the Author

Sunil Gupta is a Computer Science Engineer as well as a web Security Specialist working in the field of Cyber Security . In this area he works on different hacking tools and techniques .
His Strength: ◆ Vulnerability Assessment ◆ Penetration Testing ◆ Wi-Fi Assessment ◆ Intrusion Detection ◆Risk's Identification ◆ Data Analysis ◆ Report and Briefing.
Tools used - Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, WireShark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, MicrosoftBaseline Security Analyzer (MBSA), Web Securify, Nipper.
Platforms - Windows, Linux operating System.

Information Security
$ 94.99
per course
Also check at

FAQs About "Information Security"

About

Elektev is on a mission to organize educational content on the Internet and make it easily accessible. Elektev provides users with online course details, reviews and prices on courses aggregated from multiple online education providers.
DISCLOSURE: This page may contain affiliate links, meaning when you click the links and make a purchase, we receive a commission.

SOCIAL NETWORK