This course provides information about the different phases of penetration testing, how to gather data for your pen test, and popular pen test tools. You also learn the phases of an incident response, important documentation to collect, and the components of an incident response policy and team. Finally, you learn key steps in the forensic process and important data to collect. This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the fifth course in a series to acquire the skills to work in the field as a cybersecurity analyst.
Who should attend
Anyone who wants to gain a basic understanding of Cybersecurity or as the fifth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst.
Course Prerequisites
None
Additional information
PLEASE NOTE: It may take 2-3 business days for your course access to be activated. You will receive an email from us with all necessary details.
Only registered users can write reviews. Please Sign in or create an account