Cybersecurity

Cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.

The growth in the number of computer systems, and the increasing reliance upon them of individuals, businesses, industries and governments means that there are an increasing number of systems at risk.


Outcome
  • Understand the basic concepts of Cyber Security
  • Practice using tools to test networks and identify risks
  • Implement countermeasures to prevent cybersecurity attacks
  • Learn how to protect yourself from the predators of the Internet
  • Learn about common and emerging threats to systems

Course Overview

Introduction

Information Security Overview
What Happens Online in 60 Seconds
Elements of Information Security
The Security, Functionality, and Usability Triangle

Hacking Concepts
What is Hacking?
Who is a Hacker?
Hacker Classes
Hacking Phases
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Tracks

Ethical Hacking Concepts
What is Ethical Hacking?
Why Ethical Hacking is Necessary
Scope and Limitations of Ethical Hacking
Skills of an Ethical Hacker

Information Security Controls
Information Assurance (IA)
Information Security Management Program
Enterprise Information Security Architecture (EISA)
Network Security Zoning
Defense-in-Depth

Penetration Testing Concepts
Penetration Testing
Why Penetration Testing
Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
Blue Teaming/Red Teaming
Types of Penetration Testing
Phases of Penetration Testing
Security Testing Methodology

Footprinting and Reconnaissance

Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Website Footprinting
Email Footprinting
Indexing & Selecting Data
Competitive Intelligence
Whois Footprinting
DNS & Network Footprinting
Footprinting through Social Engineering
Footprinting Tools

Scanning Networks
Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Scanning Pen Testing

System Hacking

Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing

Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Malware Penetration Testing

Sniffing
Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attacks
DNS Poisoning

Social Engineering
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures

Denial-of-Service
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools

Session Hijacking
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools

Hacking Web Servers
Web Server Attacks
Web Server Attack Tools
Web Server Security Tools
Patch Management

Hacking Web Applications
Web App Threats
Hacking Methodology
Web App Hacking Tools
Web App Security Testing Tools
Web App Pen Testing

SQL Injection
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques

Hacking Wireless Networks
Wireless Encryption
Wireless Threats
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security Tools
Wireless Pen Testing

Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Pen Testing

IoT Hacking
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
IoT Pen Testing

Cloud Computing
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing

Cryptography
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures


Prerequisites
  • Eagerness to learn
  • Laptop
Duration

2-2.5 hours/day
Total 20 days (40-45 hours)


Fees per head

₹ 6500

*fee discounts available at selective locations.

Contact Us

Start your growth with us today!