Network Analysis
nNetwork Data Analysis
nNetwork Data Correlation, Output, and Tools
nScanning a Host with NMAP
nNetwork Segmentation and Honeypots
nGroup Policies, ACLs, Hardening, and NAC
nConfiguring a Host Firewall on Ubuntu using UFW
nSecurity Practices
nPentesting — Part 1
nPentesting — Part 2
nReverse Engineering
nRisk Evaluation
nAnalyzing Possible Malware
nThreat Management
nThe Vulnerability Management Process
nVulnerability Scan Requirements and Frequency
nVulnerability Reports, Remediation, and Continuous Monitoring
nInstalling and Configuring OpenVAS
nCommon Symptoms
nNetwork Related Symptoms
nHost Related Symptoms
nNetcat and Application Related Symptoms
nLooking for Malware on Windows Systems
nLooking for Malware on Linux Systems
nUsing Wireshark to Identify Malicious Network Activity
nDetermining Impact
nIncident Response Process and Threat Classifications
nDetermining Impact Severity and Prioritization and Reviewing Data Classifications
nIdentity and Access Management (IAM)
nIdentities, Repositories, Federation, SSO, and Exploits
nWorking with Windows Accounts and Security Policies
nWorking with Linux Accounts and Password Policies
703, Damas Tower – Al Maktoum road,Dubai,UAE
00971 4 2216779 - Mob: 00971505182527
info@almawrededu.ae | hr.almawred@hotmail.com
copyright© Almawred Training Institute 2024