Cyber Security Course

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Cyber Security Course 

Syllabus

Module 1 – Preparatory Sessions – Python & Linux Foundation


Preview
Python 
 Introduction to Python and IDEs – The basics of the python programming language,
how you can use various IDEs for python development like Jupyter, Pycharm, etc.
 Python Basics – Variables, Data Types, Loops, Conditional Statements, functions,
decorators, lambda functions, file handling, exception handling ,etc.
 Object Oriented Programming – Introduction to OOPs concepts like classes, objects,
inheritance, abstraction, polymorphism, encapsulation, etc.
 Hands-on Sessions And Assignments for Practice – The culmination of all the above
concepts with real-world problem statements for better understanding.
Linux
 Introduction to Linux  – Establishing the fundamental knowledge of how linux works
and how you can begin with Linux OS.
 Linux Basics – File Handling, data extraction, etc.
 Hands-on Sessions And Assignments for Practice – Strategically curated problem
statements for you to start with Linux.

Module 2: Introduction to Cyber Security & Information Security


Preview
2.1 What is Cyber Security
2.2 Overview
2.3 Need and Importance
2.4 Different verticals

Module 3: Working with Kali Linux 2021.1


Preview
3.1 Introduction to Kali Linux
3.2 Services in Kali (HTTP, SSH)
3.3 Wget, curl, grep, awk, tail, head, watch, find, locate
3.4 Piping and Redirection
3.5 Python and Bash Scripting
3.6 Netcat, Socat, Powercat, Powershell, Wireshark, tcpdump
3.7 Note taking

Module 4: Network Security


Preview
4.1 Security Controls
4.2 Networking Concepts
4.3 Traffic Analysis
4.4 Packet Analysers
4.5 Sniffers
4.6 Firewalls
4.7 SIEM
4.8 VLAN
4.9 VPN

Module 5: Incident Detection with Security Information and Event Management (SIEM)
Preview
5.1 Understand the Basic Concepts of Security Information and Event Management (SIEM)
5.2 Discuss the Different SIEM Solutions
5.3 Understand the SIEM Deployment
5.4 Learn Different Use Case Examples for Application-Level Incident Detection
5.5 Learn Different Use Case Examples for Insider Incident Detection
5.6 Learn Different Use Case Examples for Network Level Incident Detection
5.7 Learn Different Use Case Examples for Host Level Incident Detection
5.8 Learn Different Use Case Examples for Compliance
5.9 Understand the Concept of Handling Alert Triaging and Analysis

Module 6: Security Operations and Management


Preview
6.1 Understand the SOC Fundamentals
6.2 Discuss the Components of SOC: People, Processes and Technology
6.3 Understand the Implementation of SOC

Module 7: Identity and Access Management (IAM)


Preview
7.1 Logical/Physical Access to Assets Management
7.2 Authentication and Identification Management
7.3 Integrating Identity as a Third-Party Service
7.4 Mechanism of Authorization
7.5 Provisioning Life Cycle’s Identity and Access

Module 8: Web Application Penetration Testing


Preview
Moving ahead in this cyber security online course, you will learn identifying threats in the
web applications.
8.1 OWASP Tools and Methodologies
8.2 Insecure Deserialization
8.3 Clickjacking
8.4 Black Box Testing
8.5 White Box Testing
8.6 Fuzzing
8.7 Cryptograph
8.8 Symmetric/Asymmetric Cryptography
8.9 Hashing
8.10 Digital Signatures
8.11 API Security
8.12 Patch Management

Module 9: Malware Analysis


Preview
9.1 Types
9.2 Ransomware
9.3 Detection
9.4 Analysis

Module 10: Ethical Hacking


Preview
10.1 Introduction
10.2 Foot Printing and Reconnaissance
10.3 Scanning Networks
10.4 Enumeration
10.5 Vulnerability Analysis
10.6 System Hacking
10.7 Sniffing
10.8 Social Engineering
10.9 Denial-of-Service
10.10 Session Hijacking
10.11 Evading IDS
10.12 Firewalls and Honeypots
10.13 Hacking Web Servers
10.14 SQL Injection
10.15 Hacking – Wireless Networks
10.16 Mobile Platforms

Module 11: Cloud Security


Preview
11.1 Infrastructure Security: Network level security, Host level security, Application-level
security
11.2 Data security and Storage: Data privacy and security Issues, Jurisdictional issues raised
by Data location
11.3 Access Control
11.4 Trust, Reputation, Risk
11.5 Authentication in cloud computing, Client access in cloud, Cloud contracting Model,
Commercial and business considerations

Module 12: Software Development Security


Preview
12.1 Security Controls for The Development Environment
12.2 Life Cycle Security
12.3 Impact of Acquired Software Security
12.4 Effectiveness of Software Security.

Module 13 - Capstone Project


Preview
In this module, you will learn how to prevent a web application from being hacked as well as
what key points to be considered for making an web application secure. This capstone
project will give you exposure of both blue team and red team work profile and help you
gain exposure on both the sides.

You might also like