Login
  • KU Portal
  • Webmail Access
  • Banner
  • ADERP – [Off Campus]
  • ADERP – [On Campus]
  • E-Learn
  • Students
  • Future Students
  • Prospective Bachelors
  • Prospective Masters & PhD
  • Prospective MD
  • Parents
  • Sponsors
  • Alumni
Careers |
Business |
  • Equipment Directory
  • Business Development
  • Procurement
Library | Covid 19
Registration Login
Khalifa University

Discover Your Future

Select A Topic
  • Communication Technology & Electronics
  • Material Development and Manufacturing
  • Specialized Courses
  • Medical
  • Artificial Intelligence
  • Energy (Oil & Gas)
  • Advanced Technology & Security
  • Cyber Security

Penetration Testing & Cloud Security (Package 1)

Home | Courses | Penetration Testing & Cloud Security (Package 1)
Sorry! You can not book a seat now. Booking date is expired.

Lead Instructor(s)

Eng. Fatma Omar Mohamed


Sangyoung Yoon

AED 1000

2023-05-22

2023-06-02

2023-05-21

Course Description

Penetration Testing 

This 5-day training course will start from the basic cyber security concepts and will move forward to the phases of a vulnerability assessment and a penetration testing activity. The illustrated steps will mimic those performed during a real-world penetration test, and thus tools and techniques used in the real world for this type of activity will be shown. The course will cover a range of topics related to ethical hacking, including reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting.

Cloud Security

This course provides theoretical knowledge and skills in the Cloud Security field.

The content of the course includes the presentation of the elements at the base of preparation, implementation, maintenance, monitoring, and improvement of Security attitude in the cloud context. The teaching activity includes the review of changes that the Cloud imposes on governance, risk, and compliance processes. The risks characteristic of the Cloud is illustrated and the Cloud Audit techniques are evaluated.

This course will equip students with the knowledge, skills, and confidence needed to secure cloud-based infrastructure, applications, and data, and to help organizations minimize the risks associated with cloud computing.

 

Learning Objectives

Penetration Testing 

Participants will learn how to:

  1. Conduct reconnaissance and gather information about target systems and networks using various tools and techniques and how to rank and weigh such vulnerabilities.
  2. Use scanning and enumeration techniques to identify vulnerabilities and weaknesses in target systems and networks.
  3. Exploit vulnerabilities in target systems and networks using both manual and automated techniques, including social engineering, phishing, and other attack vectors.
  4. Maintain access and escalate privileges on target systems and networks through post-exploitation techniques.
  5. Use various tools and techniques to evade detection and maintain persistence on target systems and networks.
  6. Write clear and concise reports that communicate the results of their testing to stakeholders.

The course will include a mix of lectures, hands-on exercises, and practical case studies to provide participants with a comprehensive understanding of penetration testing best practices.

Upon completion of the course, participants will have the knowledge and skills necessary to conduct effective penetration testing and simulate real-world attacks to help organizations identify and remediate security weaknesses.

Cloud Security

  1. Understanding the fundamental concepts of cloud security, including the unique risks and challenges associated with cloud computing.
  2. Learning best practices for securing cloud infrastructure and applications, such as access controls, encryption, and data loss prevention.
  3. Gaining practical skills in implementing cloud security measures using various tools and technologies.
  4. Developing the ability to assess cloud security risks and implement risk management strategies to mitigate those risks.
  5. Learning about compliance requirements and industry standards related to cloud security.
  6. Understanding the shared responsibility model for cloud security and the roles and responsibilities of cloud providers and customers.
  7. Developing the ability to design and implement secure cloud architectures that align with business needs and objectives

 

Who Should Attend

KU STUDENTS

Khalifa University
Contact information
continuingeducation@ku.ac.ae

Copyright 2023- Khalifa University | All Rights Reserved