Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Online Business Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Computer Forensics

Cyber Forensics Level 3

Understand Generation VPN
Rating: 4.5 out of 54.5 (338 ratings)
1,676 students
Created by Tanmay S Dikshit
Last updated 7/2018
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Access Control
  • Intrusion Detection Systems
  • Server Management
  • Virtual Private Network
  • Next Generation Technologies

Requirements

  • Smart Phone / Laptop / Tab / Desktop Computer
  • Internet Connection or Internet Access
  • No previous knowledge required
  • No equipment or softwares required
  • An open mind and a willingness to learn something new and interesting

Description

In this course you will learn the basic concepts of Access Control & Intrusion Detection, Securities for VPN & Next Generation Technologies, Server Management And Firewalls. Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.

Who this course is for:

  • Students & Teachers of MA, M Com, MSc, LLM, MBA
  • Cyber Security Managers / Information Security Officers / Auditors / IT Consultants / Security Professionals
  • Corporate Rank - Executive Officer / Financial Officer / Administrative Officer / Technology Officer / Marketing Officer

Course content

7 sections • 46 lectures • 1h 11m total length

  • Preview00:33
  • Preview00:54
  • Preview00:59
  • Preview01:22
  • Preview01:36
  • Preview01:39
  • Preview02:07
  • Preview01:45
  • Summary
    01:15

  • Information leaks from Enterprise
    03:03
  • Steganography
    01:41
  • Surveillance Of Voice Calls By Enterpri
    01:21
  • Summary
    01:21

  • Introduction, Functions & Goals of IDS
    01:31
  • Signature
    01:43
  • Host based IDS or HIDS
    01:48
  • Network based IDS or NIDS
    02:08

  • Introduction to types of Intrus
    02:01
  • Intrusion Detection Systems
    02:27
  • Specification Modeling
    02:16
  • Intrusion Preventation
    01:15
  • Summary
    01:27

  • Introduction
    01:19
  • VPN Requirements
    01:31
  • Introduction and what is fw
    01:30
  • Functions Fw to Auditing
    01:58
  • Attack On Fw-Check Point
    00:59
  • inner firewall & Outer fw
    01:01
  • Inner & Outer Firewall
    01:31
  • Summary
    01:02
  • Introduction
    01:30
  • A captured Ethernet
    02:10
  • IP Sec
    01:55
  • Summary
    00:54

  • User management & Security Poly
    01:40
  • User’s Security Policy Issues
    02:17
  • Passwords
    00:35
  • Grp Access & Permissions
    01:45
  • Crypgpy Keys & Digital Cert
    00:59
  • Summary
    00:51

  • Introduction
    01:21
  • DMZ
    01:58
  • Outter Firewall
    01:30
  • DMZ Servers
    02:28
  • DMS DNZ Servers
    01:53
  • Summary
    01:04

Instructor

Tanmay S Dikshit
CCI, CEH, ECSA, PGDCL, Cyber Forensic Expert
Tanmay S Dikshit
  • 4.4 Instructor Rating
  • 492 Reviews
  • 2,704 Students
  • 3 Courses

Tanmay is an author and trainer in the domain of Cyber Security. Having delivered more than 150 seminars and Workshop at 0rganizations, he is one of the most sought after speakers about ethical hacking, cyber security and investigations. He is a certified Trainer for Cyber Security & Digital Forensic and competent to conduct seminar and workshops for Information Security, Computer & Network Security, Internet Threats & Mobile Security, Digital Forensic, Cyber Crime Investigation & Case Study. He has delivered these workshops and seminars for Diploma and Degree students as well as teaching staff for Government and Private Engineering and Computer Science colleges.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.