Course Content
Introduction To OSI Model
0/1
Port and common Port Numbers
0/1
DMZ – Demilitarized zone
0/1
Phases of ethical hacking
0/1
Common types of attacks
0/1
Certification and knowledge
0/1
Cyber security agenda – 1) Malware Attack
0/1
Cyber Security agenda – 2) Phishing Attack
0/1
Cyber security agenda – 3 )Password Attack
0/1
Cyber security agenda – 4 ) DDOS Attack
0/1
Cyber security agenda – 5 ) MITM Attack
0/1
Cyber security agenda – 6) Drive By Downloads Attack
0/1
Cyber security agenda – 7) Malvertising Attack
0/1
Cyber security agenda – 8) Rouge Software Attack
0/1
Terminologies related to networking
0/1
Final Quiz
0/1
Inplant Training Cyber Security
Join the conversation
0% Complete
Scroll to Top