What you'll learn
- Learn Information Security Management
- Tackle various security threats
- Become a secured computer user
- Learn Network Penetration Testing
- Create virtual environment on Windows and Linux.
- Evaluate the security of an organization
- If you are looking out for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this video is for you.
Information security mechanism is one of the most crucial factor for any organization. Important assets of organization demand a proper risk management and threat model for security and hence, information security concepts are gaining a lot of traction. This course will initially cover the concept of information security and software installations process. It will then move on to modules like threat modelling, risk management and mitigation.
This Course covers the network and web scanning . Later in the course it teaches how to use Kali Linux for ethical hacking, it will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks and have some hands-on experience. It will also cover concepts of incident response system, information rights management and so on. It will then guide you towards building your own information security framework best fit for your organization.
At the end of this course, you will be well versed with all the factors involved with information security which would help you build a security framework which will be perfect fit for your organizational requirement
About the Author
Sunil Gupta is a Computer Science Engineer as well as a web Security Specialist working in the field of Cyber Security . In this area he works on different hacking tools and techniques .
His Strength: ◆ Vulnerability Assessment ◆ Penetration Testing ◆ Wi-Fi Assessment ◆ Intrusion Detection ◆Risk's Identification ◆ Data Analysis ◆ Report and Briefing.
Tools used - Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, WireShark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, MicrosoftBaseline Security Analyzer (MBSA), Web Securify, Nipper.
Platforms - Windows, Linux operating System.
Who this course is for:
- This course is targeted towards security analyst, professionals dealing with security mechanism in an organization.
Packt has been committed to developer learning since 2004. A lot has changed in software since then - but Packt has remained responsive to these changes, continuing to look forward at the trends and tools defining the way we work and live. And how to put them to work.
With an extensive library of content - more than 4000 books and video courses -Packt's mission is to help developers stay relevant in a rapidly changing world. From new web frameworks and programming languages, to cutting edge data analytics, and DevOps, Packt takes software professionals in every field to what's important to them now.
From skills that will help you to develop and future proof your career to immediate solutions to every day tech challenges, Packt is a go-to resource to make you a better, smarter developer.
Packt Udemy courses continue this tradition, bringing you comprehensive yet concise video courses straight from the experts.