Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Basics and Installation
Basic Commands Shell
System Administration
Security and Monitoring
Advanced Usage and Troubleshooting
What is Social Engineering?
Social Engineering Tactics
Types of Social Engineering Attacks
Protection Methods and Awareness
Real-World Examples and Analysis
What is IAM? What is not?
What are the IAM advantages?
What is PAM?
Why is it important?
What is SIEM?
Splunk
SIEM types
Symmetric encryption
Asymmetric encryption
Tools
Penetration Test
What are the IAM advantages?
What is SIEM?
Splunk
SIEM types
Symmetric encryption
Asymmetric encryption
Tools
Fundamentals
Meterpreter
Managing Sessions
Craking Modes
Multiple CPU or GPU
Rules
Port Specification Options
Scanning Types
Host Discovery
Scanning Command Syntax
BE THE FIRST TO KNOW ABOUT NEW NEWS & COURSES
Created by © Recep Bayram