Overview of Hacker Techniques and Tools
Technical Overview of Hacking
Footprinting
Network Scanning
Malware and Worms and Their Controls
Sniffing Attacks
Social Engineering Attacks
Denial of Service (DoS) Attacks
Session Hijacking
Incident Handling and Response
Cloud Security Concepts
Cyber Kill Chain
Data Leakage Concepts
Data Leak Prevention (DLP)
Data at Rest
Data in Motion
Data in Use
Data Classification
Data Inventory and Discovery
Data Ownership
Data Lifecycle
Data Creation
Data Storage
Data Usage
Data Sharing
Data Archiving
Data Destruction
Data Discovery Methodologies
Information Rights Management (IRM)