Information Security

Information Security

English | MP4 | AVC 1920×1080 | AAC 44KHz 2ch | 2h 31m | 404 MB

Build your own Information Security Framework and become a secure computer user

Information security mechanism is one of the most crucial factor for any organization. Important assets of organization demand a proper risk management and threat model for security and hence, information security concepts are gaining a lot of traction. This course will initially cover the concept of information security and software installations process. It will then move on to modules like threat modelling, risk management and mitigation.

This Course covers the network and web scanning . Later in the course it teaches how to use Kali Linux for ethical hacking, it will have different practicals on using Kali Linux such as for information gathering, vulnerability analysis, web application analysis, database assessment and password attacks and have some hands-on experience. It will also cover concepts of incident response system, information rights management and so on. It will then guide you towards building your own information security framework best fit for your organization.

At the end of this course, you will be well versed with all the factors involved with information security which would help you build a security framework which will be perfect fit for your organizational requirement

This course follows a step-by-step approach which covers penetration testing and building an Information security framework which will be a perfect fit for the organizational requirement.

What You Will Learn

  • Learn Information Security Management
  • Tackle various security threats
  • Become a secured computer user
  • Learn Network Penetration Testing
  • Create virtual environment on Windows and Linux.
  • Evaluate the security of an organization
Table of Contents

01 The Course Overview
02 Elements of Information Security
03 Top Information Security Attacks
04 Threat Categories and Host Based Attacks
05 Hacking and its Types
06 Exploring VAPT (Vulnerability Assessment and Penetration Testing)
07 Threat Modeling and Security Policies
08 Incident Management
09 Exploring Kali Linux OS and VMware
10 Installation Process of Virtual Machines
11 IP Scanning and Port Scanning Process
12 Network Vulnerability Scanning
13 Acunetix Web Vulnerability Scanner
14 WordPress Website Scanning
15 Installing FTP Server in Windows
16 Cracking Passwords Using Kali Linux
17 Metasploit Framework in Kali Linux
18 Hacking windows7 Using Kali Linux
19 Exploitation Countermeasures Techniques