- Home
- Cyber Security Training (CCNA+LINEUX+Security+,CEPENT+CEH)
COURSE DESCRIPTION
Introduction to Cyber Security
- What is Cyber Security?
- Importance of Cyber Security
- Cyber Security Domains
- CIA Triad
- Vulnerability, Threat and Risk
Networking Fundamentals
- Computer Networks and Types of Networks
- Network Devices
- IP and MAC Address
- IPv4 and IPV6 Packet Structure
- Addressing and Subnetting
- OSI Model and TCP/IP Model
- Network Protocols (TCP, UDP, ICMP, ARP)
- Network Services (DNS, DHCP, SNMP, FTP)
Linux Essentials
-History and Features of Linux
-Architecture of Linux OS
-Linux Distributions
-Linux Command Line
-User Management -Permission-Process
-File System-Boot Process
-Shell Scripting - Some basic Tasks
Cryptography
- Introduction to Cryptography
- Symmetric Ciphers
- Asymmetric Ciphers
- Digital Certificates and Digital Signatures
- Hashing
- Encoding
- Steganography
Social Engineering
- Phishing Attacks
- Social Engineering Campaigns
- Human based attacks
- Defense against Social Engineering
Network Security
- Internet, Intranet, and Extranet
- DMZ
- Firewalls
- IDS, IPS and IDPS
- VPN and tunneling
- Honeypots & Deception Technology
- Packet Analysis using Wireshark
Vulnerability Management
- Fundamentals of Vulnerability Assessment and Management
- Vulnerability Assessment tool Deployment Strategy
- Scanning Methodologies
- Planning and Performing Infrastructure Security Assessment
- Risk Identification and Categorization
Introduction to Penetration Testing
- Introduction to Penetration Testing
- Types of Penetration Testing
- Penetration Testing Phases
- Pre-Engagement Actions
- OSINT
- Exploitation (Automated)
- Password Cracking
Advanced Network Pentesting
- Manual Exploitation of System Vulnerabilities
- Post-Exploitation
- Privilege Escalation (Linux and Windows)
- Cyber Kill Chain, MITRE ATT&CK
Web Fundamentals & Web Application Pentesting
- Web application Technologies
- Web Application offence and defence
- Web Reconnaissance
- Web Application Vulnerability Assessment
- CMS Enumeration and Exploitation
- OWASP Top 10 Web Risks
- Tools - Nikto, Burpsuite, gobuster, wpscan
- Project : VAPT Report
Wi-Fi Security
- Wi-Fi Security
- Aircrack-ng Essentials
- Attacking Wi-Fi security protocols (WEP, WPA/WPA2)
Security Operations Fundamentals
- Introduction to SIEM
- Enterprise Infrastructure
- Security Operations Essentials
Security Operations with Splunk
- SOC Analysis using Splunk
- Search Processing Language Basics
- Splunk Kno
