6. Hacking Techniques, Tools, and Incident Handling

6. Hacking Techniques, Tools, and Incident Handling

6.1 Hacking Techniques and Incident Handling

  • Overview of Hacker Techniques and Tools

  • Technical Overview of Hacking

  • Footprinting

  • Network Scanning

  • Malware and Worms and Their Controls

  • Sniffing Attacks

  • Social Engineering Attacks

  • Denial of Service (DoS) Attacks

  • Session Hijacking

  • Incident Handling and Response

  • Cloud Security Concepts

  • Cyber Kill Chain


6.2 Data Leakage and Data Protection

  • Data Leakage Concepts

  • Data Leak Prevention (DLP)

  • Data at Rest

  • Data in Motion

  • Data in Use


6.3 Data Governance and Information Protection

  • Data Classification

  • Data Inventory and Discovery

  • Data Ownership

  • Data Lifecycle

    • Data Creation

    • Data Storage

    • Data Usage

    • Data Sharing

    • Data Archiving

    • Data Destruction

  • Data Discovery Methodologies

  • Information Rights Management (IRM)