Cyber Security ​​attack techniques

This course is part of the Cyber Security
Language Arabic
Start Date 21/01/2020
Duration 10 weeks
Effort 0 hours
Level Entry Level
End Date 01/04/2020

If you've ever studied famous fights in history, you'll know that no two are exactly the same. However, similar strategies and tactics are often used in battle because they have proven effective over time. Likewise, when a criminal tries to hack into an organization, they will not reinvent the wheel unless they absolutely have the following: they will rely on common types of hacking techniques known to be very effective, such as malware, phishing, or cross-site scripting (XSS). Whether you are trying to understand the latest headlines of data breaches in the news or analyzing an incident in your organization, this helps to understand the various vectors of attack that a malicious actor may try to do harm. In this course, we'll talk about an overview of some of the most common types of attacks we see today. In this course, we will talk about some of the most famous techniques used in cyber attack and penetration, which are:

1.Phishing 2.sniffing. 3.SQL Injection. 4.MITM. 5.DDOS. 6.Dnsmap 7.Routersploit

What You Will Learn

  • What is the phishing technique and how to apply it
  • What is Sniffing Technology and how to apply it
  • What is SQL Injection technology and how to apply it
  • What is MITM technology and how to apply it
  • What is DDOS technology and how to apply it
  • What is DNSMAP technology and how to implement it
  • What is RouterSploit technology and how to implement it

Course Provider

Notify Me
You are using an unsupported browser.

Please use Chrome, Firefox, Safari, or Edge Install supported browser

×