Course Curriculum
Module 01: Security Analyst And The Threat Landscape | |||
What is a Security Analyst – Part 1 | 00:43:00 | ||
What is a Security Analyst – Part 2 | 00:01:00 | ||
What is a Security Analyst – Part 3 | 00:01:00 | ||
Threat Landscape – Part 1 | 00:16:00 | ||
Threat Landscape – Part 2 | 00:01:00 | ||
Threat Landscape – Part 3 | 00:01:00 | ||
Module 02: Policies, Procedures, And Risk | |||
Policies and Procedures – Part 1 | 00:35:00 | ||
Policies and Procedures – Part 2 | 00:01:00 | ||
Policies and Procedures – Part 3 | 00:01:00 | ||
Risk Assessment – Part 1 | 00:23:00 | ||
Risk Assessment – Part 2 | 00:01:00 | ||
Risk Assessment – Part 3 | 00:01:00 | ||
Module 03: Auditing, Vulnerability, And Pen Testing | |||
Auditing Vulnerability Assessment and Pen Test – Part 1 | 00:24:00 | ||
Auditing Vulnerability Assessment and Pen Test – Part 2 | 00:01:00 | ||
Auditing Vulnerability Assessment and Pen Test – Part 3 | 00:01:00 | ||
Types and Phases of Penetration Testing – Part 3 | 00:01:00 | ||
Types and Phases of Penetration Testing – Part 2 | 00:01:00 | ||
Types and Phases of Penetration Testing – Part 3 | 00:01:00 | ||
Module 04: Methodologies, Guidelines, And Pen Test Results | |||
Methodologies and Guidelines – Part 1 | 00:37:00 | ||
Methodologies and Guidelines – Part 2 | 00:01:00 | ||
Methodologies and Guidelines – Part 3 | 00:01:00 | ||
Penetration Testing Results – Part 1 | 00:34:00 | ||
Penetration Testing Results – Part 2 | 00:01:00 | ||
Penetration Testing Results – Part 3 | 00:01:00 | ||
Order Your Certificate | |||
Order Your Certificate | 00:00:00 |