OBJECTIVES

The purpose of online training course is to give a roundup of information on all the issues they concern Security and hacking.

RECIPIENTS

Tutti

DURATION

30 minutes

CONTENTS

MODULE 1 - The phases of a hacker attack

  • What is Cyber ​​Security
  • How a hacker works
  • Footprinting
  • Scan
  • Learning Stop
  • The enumeration

 

MODULE 2 - The main vulnerabilities on the web

  • Password and Software Vulnerabilities
  • Access point vulnerabilities
  • Information leakage
  • Hosting Services Vulnerabilities
  • Learning Stop
  • Risks related to the configuration of the devices
  • Inadequate access controls on files and directories
  • Lack of safety standards

TECHNICAL REQUIREMENTS:

Acrobat Reader

PDF documents are exported from version 5 and are compatible with all subsequent versions of Acrobat Reader released up to the update date of this file.

Browser

  • Internet Explorer 10
  • Internet Explorer 11
  • Mozilla Firefox
  • Google Chrome

JavaScript enabled

Pop-up blocker disabled

Minimum video resolution

The courses are optimized for a 1024 × 768 display on PCs and tablets of at least 7 inches.

Speakers or headphones (in case of multimedia products)

DATA TRACKING METHOD: SCORM 1.2

DEVELOPMENT TECHNOLOGY:

HTML5

PRODUCED BY:

PIAZZA COPERNICO

Content edited by: PIAZZA COPERNICO

COURSE CODE:

0042_18_01