Vulnerability Management, Penetration Testing & Digital Forensic |
- Vulnerability Management Overview
- VM Components and Deployment Model
- VM Process Overview to mitigate vulnerabilities and mitigation
- Penetration Testing Overview
- PT Tools and Command Line
- Forensic Tool Overview and Deployment
- Analysis – Email, Windows image, ransomware
- Chain of Custody Lifecycle – managing Data, managing evidence, log retention etc
- OEM Overview
|
- Instructor Led interactive online training
- Online Self-paced training
|
Click Here |