Hacking and Security Vulnerability Management
CERTIFIED INFORMATION SECURITY SPECIALIST (CISS)
This training covers a broad domains of security topics including network security, web application security, and mobile application security. It begins by covering the basic concept of different security domain and move to the threats landscape and security assessment. You will be able to assess the security posture of your digital assets and learn what and how to implement a defense-in-depth base on the findings. This training is suitable for the industry newcomer or any IT professionals that would like to strengthen their knowledge and skills in these security domains.
STRENGTHS OF THIS COURSE
Pre-training
Security Assessment With Analysis Report
We are the first to introduce this training method in the industry! Prior to the training, our security engineers will conduct a security assessment and provide a security analysis report on your digital asset.
Understanding Your Digital Asset
You will get a clear understanding on the security and the hidden risks of your digital asset.
During the training
Hands-on Session
You will learn and improve your technical skills to test and secure your digital assets.
Solution-Driven
You will have the opportunity to focus and get professional consultation from trainer based on the challenges you face in the security analysis report on your digital asset.
Live Hacking and Penetration Testing Session
You will practise and sharpen your skills by applying it in live platform.
Post-training
Skills Application
You will be able to understand and fix the vulnerabilities of your digital asset listed in the security analysis report.
Master Information Security
You will be able to master advanced techniques to perform vulnerability assessment and identify the weaknesses of your digital assets.
Ready to get started?
Please fill up the form to sign up and get a call back from our sales representatives.
Course Outline
Module 1 : Web Application Architecture
Module 2 : HTTP Basics
Module 3 : Injection
Module 4 : Cross Site Scripting
Module 5 : Cross Site Request Forgery
Module 6 : Mastering Burp Suite
Module 7 : File Inclusion Attacks
Module 8: Overview of Network Security
Module 9 : Target Enumerations and Port Scanning
Module 10 : Vulnerability Assessment
Module 11 : Penetration Testing with Metasploit
Module 12 : Sniffing
Module 13 : Password Cracking
Module 14 : Introduction to Android
Module 15 : Android Architecture
Module 16 : Android Security Model
Module 17 : Android Application Assessments
Module 18 : Automated Assessments with Drozer
Module 19 : Introduction to iOS
Module 20 : iOS Security Model
Module 21 : iOS Application Assessments
Module 22 : iOS Application Cracking and Patching
Learning Outcome
• Enable you to understand and demonstrate key concepts of information security
• Discover the security risks in different security domains
• Learn to perform vulnerability assessment and identify vulnerabilities of your digital assets
• Identify best practices that can be used to protect and enhance the security of your network, web application and mobile application
• Enable you to understand the types of security countermeasures available and how they should be applied
Who Should Attend
• IT Professionals
• Information Security Personnel
• Network Administrator
• Web Application Developer
• Mobile Application Developers
• Penetration Tester
• And Anyone Who is Responsible For Information Security And Data Protection
Hacking and Security Vulnerability Management
Brochure