Description
|
Enrolment Author Kenneth R. van Wyk Overview Moving beyond the content discussed in “Applying Cybersecurity”, this course addresses more advanced topics which are relevant to cybersecurity in today’s business environment. It reviews centralised system management and monitoring, forensic and malware analysis, popular security testing methodologies and what they can accomplish, and software security. Topic discussed - Event logging and aggregation
- Security information and event management
- System analysis
- Storage analysis
- Network analysis
- Reverse engineering
- Decompiling and disassembly
- Network discovery
- Vulnerability probing
- Exploiting vulnerabilities
- Design review
- Code review
- Software security testing
Learning Objectives - Understand centralised management and monitoring
- Learn about forensic analysis
- Understand malware analysis
- Review vulnerability scanning and penetration testing
- Understand software security
|