[Update Links] Assessment Methodologies | INE

Assessment Methodologies | INE
English | Size: 997.61 MB
Genre: eLearning

We live in an interconnected world where daily life revolves around the use of technology. While humans have locked doors and protected themselves from physical harm for all of history, this same care is not taken with identity and information. For anyone unfamiliar with cyber security, the concepts can seem daunting and are often cloaked in a facade of secrecy. In truth, they’re just not commonly known. This course is for anyone wanting to get a better understanding of cyber security concepts, whether or not they want to start a career in cyber security. The concepts and techniques covered will aid in starting towards the
eJPT (eLearnSecurity Junior Penetration Tester) certificate.

At the end of this course, students will be able to:

* Describe cyber security, the CIA triad, and risk management.
* Identify networking concepts like TCP/IP, packets, and ports.
* Follow steps for footprinting and scanning a network.
* Identify methods and techniques for exploiting vulnerabilities.



If any links die or problem unrar, send request to

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.