Basic Computer Analysis

Share on facebook
Share on google
Share on twitter
Share on linkedin

Main Topics

  • Vulnerability, threat definitions
  • Open source security vulnerability scanners and their use
  • Windows operating system audit
  • Control of Unix / Linux systems
  • Extract the topology of a network
  • Border systems inspection

Prerequisites

  • Basic network knowledge
  • Operating systems knowledge (Windows and Unix)
  • Getting to know border security structures

Duration: 3 days