Introduction to IT and Cybersecurity
Session Description
We will talk about the differences between viruses, worms, and Trojans, as well as examples of each.
Sessions In This Series
Ethical Hacking Certification Prep
11/07/18 at 4:00 pm
Ethical Hacking - Session 1: Introduction and the Basics
11/14/18 at 4:00 pm
Ethical Hacking - Session 2: Footprinting
11/19/18 at 4:00 pm
Ethical Hacking - Session 3: Scanning and Enumeration
11/21/18 at 4:00 pm
Ethical Hacking - Session 4: System Hacking
11/26/18 at 4:00 pm
Ethical Hacking - Session 5: Malware
11/28/18 at 4:00 pm
Ethical Hacking - Session 6: Sniffing
12/03/18 at 4:00 pm
Ethical Hacking - Session 7: Social Engineering
12/05/18 at 4:00 pm
Ethical Hacking - Session 8: Denial of Service
12/10/18 at 4:00 pm
Ethical Hacking - Session 9: Session Hijacking
12/12/18 at 4:00 pm
Ethical Hacking - Session 10: Web Servers and Web Applications
12/19/18 at 4:00 pm
Ethical Hacking - Session 11: SQL Injection
1/07/19 at 4:00 pm
Ethical Hacking - Session 12: Wifi
1/09/19 at 4:00 pm
Ethical Hacking - Session 13: Mobile Hacking
1/14/19 at 4:00 pm
Ethical Hacking - Session 14: IDS, Firewalls, and Honeypots
1/16/19 at 4:00 pm
Ethical Hacking - Session 15: Internet of Things
1/23/19 at 4:00 pm
Ethical Hacking - Session 16: Cloud
1/28/19 at 4:00 pm
Ethical Hacking - Session 17: Cryptography
1/28/19 at 4:00 pm
Ethical Hacking - Session 18: Reporting
Instructed By

Ken Underhill
Master Instructor