Certified Ethical Hacker (CEH) v8: Malware
Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, ...
Certified Ethical Hacker (CEH) v8: Network Scanning
Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can ...
Certified Ethical Hacker (CEH) v8: Sniffing
Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the ...
Certified Ethical Hacker (CEH) v8: Social Engineering
Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by ...
Certified Ethical Hacker (CEH) v8: SQL Injection
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate ...
Certified Ethical Hacker (CEH) v8: System Hacking
System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look ...
CISA Domain: Governance and Management of IT - Part 1
IS Governance is an incredibly important part of IS security. Management and monitoring of resources are built into the audit process and the CISA must be aware of the role they will play in the ...
CISA Domain: Governance and Management of IT - Part 2
Information Security Management Practices should adhere to the business goals of an organization, aligning to the objectives that management set down for company improvement. This course examines ...
CISA Domain: IS Acquisition, Development and Implementation - Part 2
Business Application Systems play a substantial role in many corporate infrastructures today. This course examines the role of the auditor in environments where business application systems and agile ...
CISA Domain: IS Acquisition, Development and Implementation - Part 3
This course examines the auditor's role in auditing physical and software infrastructures and the maintenance of those infrastructures. The Certified Information Systems Auditor (CISA) certification ...