
OBJECTIVES
The purpose of online training course is to give a roundup of information on all the issues they concern Security and hacking.
RECIPIENTS
Tutti
DURATION
30 minutes
CONTENTS
MODULE 1 - The phases of a hacker attack
- What is Cyber Security
- How a hacker works
- Footprinting
- Scan
- Learning Stop
- The enumeration
MODULE 2 - The main vulnerabilities on the web
- Password and Software Vulnerabilities
- Access point vulnerabilities
- Information leakage
- Hosting Services Vulnerabilities
- Learning Stop
- Risks related to the configuration of the devices
- Inadequate access controls on files and directories
- Lack of safety standards
TECHNICAL REQUIREMENTS:
Acrobat Reader
PDF documents are exported from version 5 and are compatible with all subsequent versions of Acrobat Reader released up to the update date of this file.
Browser
- Internet Explorer 10
- Internet Explorer 11
- Mozilla Firefox
- Google Chrome
JavaScript enabled
Pop-up blocker disabled
Minimum video resolution
The courses are optimized for a 1024 × 768 display on PCs and tablets of at least 7 inches.
Speakers or headphones (in case of multimedia products)
DATA TRACKING METHOD: SCORM 1.2
DEVELOPMENT TECHNOLOGY:
HTML5
PRODUCED BY:
PIAZZA COPERNICO
Content edited by: PIAZZA COPERNICO
COURSE CODE:
0042_18_01