Part 1: Gathering Information Module 1: Applying Environmental Reconnaissance Module 2: Analyzing Network Reconnaissance Module 3: Strengthening the Network Module 4: Exploring Penetration Testing Part 2: Uncovering Exposures Module 5: Scanning for Vulnerabilities Module 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities Part 3: Responding to Attacks Module 7: Reacting to a Cyber Incident: Impact and Forensics Module 8: Reacting to a Cyber Incident: Communication and Incident Recovery Module 9: Reacting to a Cyber Incident: Analyzing Common Symptoms Part 4: Improving Security Module 10: Security Structures and Identifying and Access Management Module 11: Defense in Depth, Software Development, and Data Analytics
Meistverkauft in Studium & Erwachsenenbildung
Aktuelle Folie {CURRENT_SLIDE} von {TOTAL_SLIDES}- Meistverkauft in Studium & Erwachsenenbildung