Course Overview

This learning path equips you with all the knowledge needed to build cyber resilience in the supply chain industry. You'll start with the very basics in cybersecurity, while you'll also learn how cybersecurity must be implemented by various businesses. You'll gain an understanding of the nuisance caused by malware and zero-day attacks across businesses. You'll learn about all the measures to protect a supply chain organization from intruders.

What You Will Learn

  • Learn how malicious hackers can turn your social media against you
  • Understand the Risk Mindset needed to protect the business
  • Learn to reduce your personal risk to these types of attacks
  • Understand about Buffer Overflow Attacks
  • Develop software assurance risk mitigation strategies

Program Curriculum

Content
  • Chapter 1: Introduction to Physical Security
  • Chapter 2: Securing Operating Systems
  • Chapter 3: Clear Desk and Removable Media Policy
  • Chapter 4: Internet Security
  • Chapter 5: Diving into Malware and Viruses
  • Chapter 6: Security on Social Networking Sites
  • Chapt

Content
  • Chapter 1: What's Special About ICT Supply Chains?
  • Chapter 2: Supply Chain Risk Management
  • Chapter 3: The Supply Chain Product Assurance Process
  • Chapter 4: Lifecycle Threat Assurance
  • Chapter 5: Acceptance, Implementation, and Security Dev/Ops

Content
  • Chapter 1: Introduction
  • Chapter 2: Walkthrough 1: LibHTTPD1.2
  • Chapter 3: Walkthrough 2: SLMail 5.5
  • Chapter 4: Walkthrough 3: Exploiting Crossfire
  • Chapter 5: Walkthrough 4: Egghunters
  • Chapter 6: Advanced Offensive Techniques

Content
  • Chapter 1: Introduction to Virus
  • Chapter 2: Worm: Replicates to Spread Itself
  • Chapter 3: Malicious Intentions of Trojan
  • Chapter 4: Ransomware: Threatens to Publish a Victim's Data in Return of a Handsome Ransom
  • Chapter 5: Adware: The 'Unclosable' Ad Traps

Content
  • Chapter 1: Introduction
  • Ch
Load more modules

Instructor

Dimitris Amprazis

Dimitris Amprazis has Excellent communication and consultating skills with proven abilities in resolving networking, hardware & software related issues. Ha is proficient in Linux Operating system configuration, utilities, and programming. He has extensive knowledge of hardware, software and networking technologies to provide a combination of analysis and support. Dimitris is highly killed in organizing meetings and reviews. Skills: 1. Kali Linux, Parrot Secutiy OS, CentOS, Fedora, Ubuntu, Linux Mint 2. Wireless penetration testing - WPA, WPA2, WEP 3. Network Vulnerability scan and penetration testing.Web 4. Web Application security testing, Vulnerability Assessment, penetration testing and generating reports using tool 5. Password hash cracking MD5, SHA1,SHA2, etc, 6. Experience with tools: Aircrack-ng, Hydra, Burpsuite, Metasploit. OWASP-ZAP, Nmap, Wireshark, Sqlmap, John-Ripper, Nesuss, Nikto, Dirp. 7. Steganography 8. Integration experience on Security information and Event management solutions (SIEM). 9. Network traffic analysis, supervision, filtration and packet dissection with WireShark

Jeff Minakata

Jeff Minakata has worked in the IT industry for over 22 years. He holds various cybersecurity certifications, networking certifications, and engineering certifications such as C|OSINT Certified, trained in CEH v8, CEH v9, CEH v11, CISP, Metasploit certified, Accredited Configuration Engineer (ACE), MCSI OSINT Practitioner, and CWA certified. He is an Online Instructor for OSINT, ethical hacking, and network security. He has contracted courses for EC-Council, Udemy, and has written articles for Hackin9 and eForensics magazine. Jeff currently works on the computer networking side and teaches ethical hacking, OSINT, and cybersecurity online. He is passionate about helping people understand OSINT, ethical hacking, and cybersecurity.

Shon Gerber

Shon Gerber is a Chief Information Security Officer (CISO), CISSP Trainer, and Cybersecurity Expert. He is the owner of “Reduce Cyber Risk” – Providing Cybersecurity Insight and Direction for Businesses of all Sizes. He is currently working as the CISO for a privately held global manufacturing company that deals with a wide range of security challenges from manufacturing to strong online web presence. In the past, he has worked as a supervisor within a Security Operations Center of one of the largest privately held companies in the world. Each day, his team worked to protect the company from hackers attempting to gain access to their various computer systems on a global basis. He also worked for an IT service provider as a Senior Security Architect, serving a diverse customer base with business customers from medium to large companies. He spent 11 years as a member of the US Air Force Red Team (Aggressors), targeting government and military installations from both a cyber and physical security perspective, focusing our efforts on network and physical penetration testing and providing gap and remediation training to U.S. military installations.

Skylar Simmons

Skylar Simmons is a U.S. Army veteran with over 10 years of security experience supporting various types of organizations, including, government, financial sector, and Fortune 500 companies. He holds a Bachelor’s of Science degree in Cyber Security from University of Maryland University College, along with OSCP, CISSP, and numerous other security and IT certifications.

Dan Shoemaker

Dan Shoemaker has been involved in the field of software assurance since its beginnings in 2005. He was part of the original software assurance initiative at the Department of Homeland Security and Chaired its Workforce Training and Education arm for four years, 2008 to 2012. He was a subject matter expert for both the NICE Workforce Framework and the Cybersecurity Curricular Guidelines projects. He has been a consultant and practitioner in the field for close to forty years and a professor for thirty-five. Finally, he is a Distinguished Visitor of the IEEE. and he has written twelve books and close to two-hundred articles in the field.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Learning Paths

1 of 8

Quick View

Integrating Cybersecurity into Supply Chain Management

Skip to product information
1 of 1
What's included
  • Full Video Access
  • Self-Paced Study Guide
  • 6 months of access to virtual labs
  • Once redeemed, this bundle will be valid for 12 months
  • Self-Paced Study Guide
  • Exam Voucher + Retake
View full details

Integrating Cybersecurity into Supply Chain Management

Integrating Cybersecurity into Supply Chain Management