CyberSecurity-Curriculum

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Contact-9063248348

Course Curriculum

First 2 Sessions are FREE

 Basics of Cyber Security


 Penetration Tester
 SOC
 Malware Analysis
 Networking
 Cryptography
 About Cyber Threats
 MITRE Attack Framework
 PCI DSS
 HIPPA
 Information Security
 Risk Management
 Incident Management

 Foot printing
 Advanced Google Hacking Techniques
 Deep & Dark Web Foot printing
 Competitive Intelligence Gathering
 Website Foot Printing
 Website Mirroring
 Email Foot Printing
 Who is Lookup
 DNS Foot Printing
 Traceroute Analysis
 Foot Printing Tools

 Network Scanning
 Host Discovery Techniques
 Port Scanning
 Service Version Discovery
 OS Discovery
 Banner Grabbing
 OS Fingerprinting
 Power Full Network Scanning Tools Like NMAP,ZenMap etc

 NetBIOS Enumeration
 NFS Enumeration
 Telnet Enumeration
 FTP Enumeration
 SMTP Enumeration
 DNS Enumeration
 UNIX/LINUX User Enumeration
 Enumeration Tools

 Vulnerability Research
 Vulnerability Assessment
 Vulnerability-Management Life
 Vulnerability Classification
 Vulnerability Assessment Tools
 Vulnerability Assessment Report

 OWASP TOP 10
 Malicious File Upload Attacks
 Directory Brute Forcing
 Directory Listing
 Injection Attacks
 Different Chain Attacks

 Password Cracking
 Password Attacks
 Password-Cracking Tools
 Buffer Overflow
 Privilege Escalation
 Privilege Escalation Tools
 Keyloggers
 Spyware
 Anti-Keyloggers
 Anti-Spyware
 Rootkits
 Steganography
 Steganography Tools
 Steganalysis
 Steganography
 Detection Tools
 Maintaining Persistence
 Post Exploitation
 Clearing Logs
 Covering Tracks
 Tracks-Covering Tools
 Virus
 Virus Lifecycle
 Types of viruses
 Ransomware
 Computer Worms
 Malware Analysis
 Static Malware Analysis
 Virus Detection Methods
 Trojan Analysis
 Virus Analysis
 Anti-Trojan Software
 Antivirus Software

 Malware
 Components of Malware
 APT
 Trojan
 Types of Trojans
 Exploit Kits
 Virus
 Virus Lifecycle
 Types of Viruses
 Ransomware
 Computer Worms
 Malware Analysis
 Static Malware Analysis
 Dynamic Malware Analysis
 Virus Detection Methods
 Trojan Analysis
 Virus Analysis
 Anti-Trojan Software
 Antivirus Software
 Network Sniffing
 MAC Flooding
 DHCP Starvation Attack
 ARP Spoofing Attack
 ARP Poisoning
 ARP Poisoning Tools
 MAC Spoofing
 DNS Poisoning
 DNS Poisoning Tools
 Sniffing Tools
 Sniffer Detection Techniques
 Promiscuous Detection Tools

 Social Engineering
 Types of Social Engineering
 Phishing
 Phishing Tools
 Insider Threats/Insider Attacks
 Identity Theft

 DoS Attack
 DDoS Attack
 Botnets
 DOS/DDoS Attack Techniques
 DOS/DDoS Attack Tools
 DOS/DDoS Attack Detection Techniques
 DOS/DDOS Protection Tools
 Session Hijacking
 Types of Session Hijacking
 Spoofing
 Application-Level Session Hijacking
 Man-in-the-Browser Attack
 Client-side Attacks
 Session Replay Attacks
 Session Fixation Attack
 Network Level Session Hijacking
 TCP/IP Hijacking
 Session Hijacking Tools
 Session Hijacking Detection Methods
 Session Hijacking Prevention Tools

 Intrusion Detection System (IDS)


 Intrusion Prevention System (IPS)
 Firewall
 Types of Firewalls
 Honeypot
 Intrusion Detection Tools
 Intrusion Prevention Tools
 IDS Evasion Techniques
 Firewall Evasion Techniques
 IDS/Firewall Evading Tools
 Honeypot Detection Tools

 Web Server Operations


 Web Server Attacks
 DNS Server Hijacking
 Website Defacement
 Web Server Attack Methodology
 Web Server Attack Tools
 Web Server Security Tools
 Patch Management
 Patch Management Tools

 Web Application Architecture


 Web Application Threats
 OWASP Top 10 Application Security Risks
 Web Application Hacking Methodology
 Web API
 Webhooks
 Web Shell
 Web API Hacking Methodology
 Web Application Security

 SQL Injection
 Types of SQL injection
 Blind SQL Injection
 SQL Injection Methodology
 SQL Injection Tools
 Signature Evasion Techniques
 SQL Injection Detection Tools
 Networks
 Wireless Terminology
 Wireless Networks
 Wireless Encryption
 Wireless Threats
 Wireless Hacking Methodology
 Wi-Fi Encryption Cracking
 WEP/WPA/WPA2 Cracking Tools
 Wi-Fi Security Auditing Tools

 Mobile Platform Attack Vectors


 OWASP Top 10 Mobile Risks
 App Sandboxing
 SMS Phishing
 Attack (Smishing) Android Rooting
 Hacking Android Devices
 Android Security Tools
 Jailbreaking iOS
 Hacking iOS Devices
 IOS Device Security Tools
 Mobile Device Management (MDM)
 OWASP Top 10 Mobile Controls
 Mobile Security Tools

 IoT Architecture
 IoT Communication Models
 OWASP Top 10 lot Threats
 loT Vulnerabilities
 IoT Hacking Methodology
 IoT Hacking Tools
 IoT Security Tools

 Cloud Computing
 Types of Cloud Computing Services
 Cloud Deployment Models
 Fog and Edge Computing
 Cloud Service Providers
 Container
 Docker
 Kubernetes
 Serverless Computing
 OWASP Top 10 Cloud Security Risks
 Container and Kubernetes Vulnerabilities
 Cloud Attacks
 Cloud Hacking
 Cloud Network Security
 Cloud Security Controls
 Cloud Security Tools

 Cryptography
 Encryption Algorithms
 MD5 and MD6 Hash Calculators
 Cryptography Tools
 Public Key Infrastructure (PKI)
 Email Encryption
 Disk Encryption
 Cryptanalysis
 Cryptography Attacks
 Hands on experience with different kinds of projects by using different
kinds of tools to improve technical skills as per industry require.

You might also like