Course Details
Topic 1: Port Scanning
- OSI Model
- TCP/IP and UDP Protocols
- IPv4 and IPv6
- Network Ports
- Ping and Traceroute
- Port Scanning Using NMap
Topic 2 – Cryptography
- Overview of Cryptography and Encryption
- Classic Cryptography
- Symmetric Key Encryption
- Asymmetric Key Encryption
- WiFi Security
- Secure Key Exchange and Digital Signature
- Hashing Function Cryptography
Topic 3 – Vulnerability Scanning
- Overview of Vulnerability Scanning
- Vulnerability Scanning Tools
- Install Nessus
- Perform Vulnerability Scanning Using Nessus
- Common Types of Vulnerabilities
- Cross Site Scripting (XSS) Vulnerability
Course Info
Prerequisite:
NilSoftware Requirement:
Job Roles
- IT Manager
- Network Administrator
- Systems Administrator
- Human Resources Manager
- Small Business Owner
- IT Support Specialist
- Data Protection Officer
- Risk Management Specialist
- Compliance Officer
- Operations Manager
- Financial Controller
- Marketing Manager (digital-focused)
- E-commerce Site Operator
- Customer Support Manager
- Software Developer
Trainers
Muhammed Siraj: Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well.
Skillset:
- Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field)
- Certified CEH, CHFI, Hardware repairs and maintenance.
- Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer.
- Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.
Dr. Touraj Khodadadi: Dr. Touraj Khodadadi is currently an assistant professor of cyber security. Touraj has more than 10 years of experience in IT industry, Touraj has huge experience in (Cyber Security - Consultation - Risk Management – Security Training - Incident Handling - PCI Implementation -Penetration Tester – Security assessment - Develop security policies- Auditing - Code reviewing – Digital Transformation). In addition, he authored and co-authored 30 international journals and conference papers concerning various aspects of computer, information and network security. His main research interests include authentication systems, network security, cryptography, graphical passwords, authentication systems and cloud computing security. Apart from teaching and research activities at the university, he has served as an editor and reviewer for several international journals and conferences. He is also members of several review panels for master and doctoral research defense.
Customer Reviews (7)
- I have to do a lot of practice. Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment
Good trainer and very clear explanation from the trainer. Will recommend to other staff to take this course. (Posted on 12/06/2021) - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - will recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment - Will Recommend Review by Course Participant/Trainee
-
1. Do you find the course meet your expectation? 2. Do you find the trainer knowledgeable in this subject? 3. How do you find the training environment