Vulnerability Identification In Cyber Security Course
What you'll learn
- Pen Test Matrics
- Management of a PenTest
- Information Gathering
- Vulnerability Identification
- Vulnerability Verification
Requirements
- Willingness to learn.
- You should know how to use an internet.
Description
I know why you are here. You are an intelligent and curious guy always searching words like firewalls, encryption, viruses and malware sound but couldn't get a satisfactory answer but don't worry we have a course right for you that teaches you all the basics of both information and cyber security in a fun relaxed manner. This course is made in such a way that it fits absolutely perfect for you.
It doesn't matter if you don't know anything about cyber security, because this course will help you understand what it's all about
Who this course is for:
- I created this course for everyone who wants to learn how to stay safe online.
Course content
- Preview07:14
- 06:02Management of a PenTest
- 05:59Information Gathering
- 06:08Vulnerability Identification
- 06:34Vulnerability Verification
Instructors
My name is Pronoy Kumar. I am a computer engineer. I am a very experienced web developer and working in some of the biggest companies of the world for a long time. Online teaching is my passion. I am making online video tutorials since 2008 and got a very good response. That's why now i want to share my knowledge and experience that i have gained in my 10 years long it career. My courses are very informative, updated and well designed. My main goal is to help people by providing them good educational resources.
Hello, My name is Marufa Yasmin. I am a professional web developer. I am working as a web developer for a long time and also i have worked for some of the best company of the world. Now i want to share my valuable knowledge using online courses. In my courses i will assume that you have no prior knowledge but at the end you shall learn the subject very well.