Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Photoshop Graphic Design Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Meditation Personal Transformation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Google Analytics
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
2021-02-17 14:04:28
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

The 2021 Cyber Security Beginners Guide: Part 3 - Adv Tools

Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques
Rating: 3.1 out of 53.1 (106 ratings)
51,166 students
Created by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Last updated 12/2019
English
30-Day Money-Back Guarantee

What you'll learn

  • You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
  • You will feel confident and comfortable with cyber kill chain methodology and how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
  • You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
  • You will be able to explain on your own the types of ransomwares, how crypto ransomware works and will go through a real world example of a ransomware attack on the Bristol Airport Screens.
  • You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
  • You can give insightful talks on zero-day exploit, malware and its types, man in the middle (mitm) attack and can get conversant with web application security.

Requirements

  • You should have completed three previous courses, this course is a continuation of the previous courses: a) The Absolute Beginners Guide to Cyber Security and Hacking b)The Absolute Beginners Guide to Cyber Security Part 1 c)The Absolute Beginners Guide to Hacking Part 2

Description

Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon, weaponize, deliver, exploit, install, c2, actions.

Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.

Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.


Maltego Tool Demo:

Maltego is software used for open-source intelligence and forensics, developed by Paterva from Pretoria, South Africa. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. As of 2019, the team of Maltego Technologies headquartered in Munich, Germany has taken responsibility for all global customer-facing operations.


Cyber kill chain methodology:

The “cyber kill chain” is a sequence of stages required for an attacker to successfully infiltrate a network and exfiltrate data from it. Each stage demonstrates a specific goal along the attacker’s path. Designing your monitoring and response plan around the cyber kill chain model is an effective method because it focuses on how actual attacks happen.


Security attack vectors:

An attack vector is a method or pathway used by a hacker to access or penetrate the target system. Hackers steal information, data and money from people and organizations by investigating known attack vectors and attempting to exploit vulnerabilities to gain access to the desired system. Once a hacker gains access to an organization's IT infrastructure, they can install a malicious code that allows them to remotely control IT infrastructure, spy on the organization or steal data or other resources.


Phishing techniques:

There are a number of different techniques used to obtain personal information from users. As technology becomes more advanced, the cybercriminals' techniques being used are also more advanced.

To prevent Internet phishing, users should have knowledge of how the bad guys do this and they should also be aware of anti-phishing techniques to protect themselves from becoming victims.

Who this course is for:

  • Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain
  • This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

Course content

5 sections • 5 lectures • 2h 6m total length

  • Preview15:29

  • Cyber kill chain methodology
    19:58

  • Information security attack vectors
    15:28

  • Ransomware, Mitigation Strategies, Phishing and Firewalls
    41:41

  • Web Application Security
    33:59

Instructor

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Cybersecurity, Data Science & Human Capital Practitioners!
Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
  • 4.0 Instructor Rating
  • 4,594 Reviews
  • 271,551 Students
  • 41 Courses

We specialize in Cybersecurity, Data Science and Talent Management/Human capital management training. The USP of all our training's is the hands-on that we provide, our focus is on real-life practical knowledge sharing, and not tool-based PPT slides. All our training's are conducted by highly experienced practitioners who are dyed-in-the-wool penetration testers. The material is cutting edge and updated with even the most recent developments. We have a standard set of courses outlined in different information security domains, data analytics domains and Talent management domain. However, we also customize the training according to the clients’ requirements.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.