CyberSecurity-Curriculum
CyberSecurity-Curriculum
CyberSecurity-Curriculum
Course Curriculum
Foot printing
Advanced Google Hacking Techniques
Deep & Dark Web Foot printing
Competitive Intelligence Gathering
Website Foot Printing
Website Mirroring
Email Foot Printing
Who is Lookup
DNS Foot Printing
Traceroute Analysis
Foot Printing Tools
Network Scanning
Host Discovery Techniques
Port Scanning
Service Version Discovery
OS Discovery
Banner Grabbing
OS Fingerprinting
Power Full Network Scanning Tools Like NMAP,ZenMap etc
NetBIOS Enumeration
NFS Enumeration
Telnet Enumeration
FTP Enumeration
SMTP Enumeration
DNS Enumeration
UNIX/LINUX User Enumeration
Enumeration Tools
Vulnerability Research
Vulnerability Assessment
Vulnerability-Management Life
Vulnerability Classification
Vulnerability Assessment Tools
Vulnerability Assessment Report
OWASP TOP 10
Malicious File Upload Attacks
Directory Brute Forcing
Directory Listing
Injection Attacks
Different Chain Attacks
Password Cracking
Password Attacks
Password-Cracking Tools
Buffer Overflow
Privilege Escalation
Privilege Escalation Tools
Keyloggers
Spyware
Anti-Keyloggers
Anti-Spyware
Rootkits
Steganography
Steganography Tools
Steganalysis
Steganography
Detection Tools
Maintaining Persistence
Post Exploitation
Clearing Logs
Covering Tracks
Tracks-Covering Tools
Virus
Virus Lifecycle
Types of viruses
Ransomware
Computer Worms
Malware Analysis
Static Malware Analysis
Virus Detection Methods
Trojan Analysis
Virus Analysis
Anti-Trojan Software
Antivirus Software
Malware
Components of Malware
APT
Trojan
Types of Trojans
Exploit Kits
Virus
Virus Lifecycle
Types of Viruses
Ransomware
Computer Worms
Malware Analysis
Static Malware Analysis
Dynamic Malware Analysis
Virus Detection Methods
Trojan Analysis
Virus Analysis
Anti-Trojan Software
Antivirus Software
Network Sniffing
MAC Flooding
DHCP Starvation Attack
ARP Spoofing Attack
ARP Poisoning
ARP Poisoning Tools
MAC Spoofing
DNS Poisoning
DNS Poisoning Tools
Sniffing Tools
Sniffer Detection Techniques
Promiscuous Detection Tools
Social Engineering
Types of Social Engineering
Phishing
Phishing Tools
Insider Threats/Insider Attacks
Identity Theft
DoS Attack
DDoS Attack
Botnets
DOS/DDoS Attack Techniques
DOS/DDoS Attack Tools
DOS/DDoS Attack Detection Techniques
DOS/DDOS Protection Tools
Session Hijacking
Types of Session Hijacking
Spoofing
Application-Level Session Hijacking
Man-in-the-Browser Attack
Client-side Attacks
Session Replay Attacks
Session Fixation Attack
Network Level Session Hijacking
TCP/IP Hijacking
Session Hijacking Tools
Session Hijacking Detection Methods
Session Hijacking Prevention Tools
SQL Injection
Types of SQL injection
Blind SQL Injection
SQL Injection Methodology
SQL Injection Tools
Signature Evasion Techniques
SQL Injection Detection Tools
Networks
Wireless Terminology
Wireless Networks
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wi-Fi Encryption Cracking
WEP/WPA/WPA2 Cracking Tools
Wi-Fi Security Auditing Tools
IoT Architecture
IoT Communication Models
OWASP Top 10 lot Threats
loT Vulnerabilities
IoT Hacking Methodology
IoT Hacking Tools
IoT Security Tools
Cloud Computing
Types of Cloud Computing Services
Cloud Deployment Models
Fog and Edge Computing
Cloud Service Providers
Container
Docker
Kubernetes
Serverless Computing
OWASP Top 10 Cloud Security Risks
Container and Kubernetes Vulnerabilities
Cloud Attacks
Cloud Hacking
Cloud Network Security
Cloud Security Controls
Cloud Security Tools
Cryptography
Encryption Algorithms
MD5 and MD6 Hash Calculators
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Cryptography Attacks
Hands on experience with different kinds of projects by using different
kinds of tools to improve technical skills as per industry require.