Ethical Hacking

Ethical Hacking

Ethical Hacking INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Hacking Concepts and Security Threats History of hacking What is ethical hacking...
System and Network Auditing

System and Network Auditing

System and Network Auditing INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour The Auditing Process Planning Executing audit Information Systems...
Virtualization and HA

Virtualization and HA

Virtualization and HA INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Describe the software-defined data center (SDDC) Explain the vSphere...
Social Engineering

Social Engineering

Social Engineering INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Introduction to Social Engineering Terminology History Use Cases Attack...
Security Gateways

Security Gateways

Security Gateways INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Firewall Concepts Firewalls and Their Evolution Access Control Lists or...
Introduction to Cyber Warfare

Introduction to Cyber Warfare

Introduction to Cyber Warfare INTERESTED? CONTACT US ABOUT THE PROGRAM The course covers the following topics: DON'T TOUCH THIS TAB It’s important to improve the accordion’s behaviour Hello Cyber What is cyber and what happened to information...