Introduction to Cyber Security
Basics of Security Management
TCP/IP vulnerabilities
Introduction to Cryptography
MiTM challenge and confidentiality solutions
Inspection and interception Tool – Hands-on
Firewall
IPTables Firewall
Network and Vulnerabilities Scanning
Kali Linux
Network Scanning – Demo
Services inspection – Demo
Firewall – Demo
Certificates and Authentication process
Penetration Testing
Network Penetration – Demo
Wireless Network penetration- Demo
Security Summary
Introduction to AI
Neural networks
Statistic / Social AI
NLP - Natural language processing
The future of CRM/CEM
The End