- Basic Of Networking
- CCNA -> CCNP
- Firewalls -4
- Certified Ethical Hacker
- Back Track Basic
- Kali Linux Basic
Security Specialist IT Training
د.إ7,900.00
Duration: 20 hours |
Lectures: 10 |
Microsoft Certificate |
CURRICULUM
Section 1: Introduction to Handstands
Here we have the entire syllabus we follow at macob
Section 2: Course Description
Networking Basics: What You Need to Know. A network connects computers, mobile phones,
peripherals, and even IoT devices. Switches, routers, and wireless access points are the essential
networking basics. Through them, devices connected to your network can communicate with one another
and with other networks, like the Internet.
and well maintained distribution by Offensive Security. Kali Linux default desktop environment is GNOME but it also offers a variety of other desktop environments including KDE, MATE, LXDE and others. It can be installed on various type of systems including laptops,Servers, ARM devices (raspberry pi etc.) and Cloud. It also has a portable version for android devices called NetHunter which can be used within android operating system and comes with pre-installed tools and scriptsthat offer portability while doing security auditing or penetration testing.
Why You Should Use Kali Linux?
Kali Linux is mainly used by Penetration Testers, Security
Auditors, Forensics Investigators and Researchers. It has almost every tool or script pre-installed that can be used for any of the above purposes. You can use Kali Linux to crack Wi-Fi networks, to run Open Source Intelligence (OSINT) on someone, to hack websites and networks and many more
CCNA (Cisco Certified Network Associate) is an information technology (IT) certification from Cisco Systems. CCNA certification is an associate-level Cisco Career certification.
Why should you become a CCNA?
As a networking professional, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities. With your CCNA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by the leader in Network Technologies
Cisco Certified Network Professional (CCNP) is an intermediate-level certification in the Cisco certified professional program. This certification is aimed at full-time network or system administrators, or those who work with local and/or wide-area network (LAN/WAN) infrastructure.
Why should you become a CCNP?
Having a Cisco Certified Network Professional (CCNP) certification validates your ability to implement and troubleshoot both LAN and WAN networks. In addition,you will be recognized as a person who can collaborate with specialists on issues related to voice, wireless, advanced security and video solutions.
In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.
TYPES OF FIREWALL
There are three basic types of firewalls that are used by companies to protect their data & devices to keep destructive elements out of network, viz. Packet Filters, Stateful Inspection and Proxy Server Firewalls.
Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.
The code for the C|EH exam is 312-50. This certification has now been made a baseline with a progression to the C|EH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within virtual environment.
Reviews
Average Rating
Detailed Rating
Stars 5 | 0 | |
Stars 4 | 0 | |
Stars 3 | 0 | |
Stars 2 | 0 | |
Stars 1 | 0 |
د.إ7,900.00
Duration: 20 hours |
Lectures: 10 |
Microsoft Certificate |