63 courses in category "Security Solutions"

  • Certified Ethical Hacker (CEH) v8: Malware

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 2 hours
        
    0 reviews

    Malware is malicious software, used by attackers in various ways including disruption, information gathering, and gaining access. In this course we look at how malware is created, the attack vectors, ...

  • Certified Ethical Hacker (CEH) v8: Network Scanning

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 1.5 hours
        
    0 reviews

    Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. By finding such vulnerabilities, a hacker can ...

  • Certified Ethical Hacker (CEH) v8: Sniffing

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 1.5 hours
        
    0 reviews

    Sniffing is the act of capturing data as it is transferred over a network. The data can then be recorded and used for reconnaissance, or used in an attack. In this course we look at sniffing, the ...

  • Certified Ethical Hacker (CEH) v8: Social Engineering

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 0.5 hours
        
    0 reviews

    Social Engineering is the art of manipulating people and getting them to disclose important information about themselves or their organization. This course describes different methods used by ...

  • Certified Ethical Hacker (CEH) v8: SQL Injection

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 1.5 hours
        
    0 reviews

    SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate ...

  • Certified Ethical Hacker (CEH) v8: System Hacking

    • by Skillsoft
    • Price N/A
    • online
    • Dates N/A
    • 2 hours
        
    0 reviews

    System hacking is a set of techniques aimed at gaining access to target systems, maintaining that access, and covering tracks to prevent anyone finding evidence of the access. In this course, we look ...

  •     
    0 reviews

    IS Governance is an incredibly important part of IS security. Management and monitoring of resources are built into the audit process and the CISA must be aware of the role they will play in the ...

  •     
    0 reviews

    Information Security Management Practices should adhere to the business goals of an organization, aligning to the objectives that management set down for company improvement. This course examines ...

  •     
    0 reviews

    Business Application Systems play a substantial role in many corporate infrastructures today. This course examines the role of the auditor in environments where business application systems and agile ...

  •     
    0 reviews

    This course examines the auditor's role in auditing physical and software infrastructures and the maintenance of those infrastructures. The Certified Information Systems Auditor (CISA) certification ...


Filter your search