×

About Cyber Security

Cyber Security is the art of protecting computers, networks, mobile devices, and sensitive data from cyber threats and attacks. Also known as Information Technology Security, this field is crucial in today’s digital world—spanning industries from business operations to mobile communications. The course covers key categories of cyber defense, equipping you with the skills to safeguard digital assets effectively.

Why Choose Cyber Security?
 Rising incidents of cybercrime
 Growing dependence on IoT devices
 Expanding use of digital technologies
 Emergence of the deep web and cryptocurrency
 Constantly evolving ransomware threats

Course Duration

12 Months

Daily Learning Time

2 Hours

Cyber Security Course Contents

🔹Introduction
        • Introduction to Information Security
        • Understanding Cyber Security Basics
        • The CIA Triad: Confidentiality, Integrity, Availability
        • Introduction to Hacking & Hacker Mindset
        • Different Types of Hackers
        • Information Warfare & Its Impact
        • The Growing Demand for Ethical Hackers
        • Career Opportunities in Ethical Hacking
        • Key Cyber Security Terminologies
        • Roadmap to Becoming an Ethical Hacker

🔹Basics and Environment Setup
        • Cyber Security vs. Ethical Hacking
        • Ethical Hacking Laws and Policies
        • Software/Hardware Requirements for Hacking Lab
        • Installation and Configuration of VMWare
        • Dual Boot vs Virtual Machine
        • Installing Kali in Virtual Machine
        • Managing Network Interfaces
        • Download and installation of DVWA and BWAPP
        • Installing Metasploitable
        • Installing OWASP Broken Web Application
🔹Linux
        • Introduction to Command Line
        • File Systems
        • User Hierarchy
        • Terminal and shell commands

🔹Networking
        • The OSI/TCP-IP Model
        • Data Link Layer
        • Network Layer
        • Transport Layer
        • Proxy and Proxy Servers
        • TOR
        • VPN
        • Remote login: SSH and telnet
        • Introduction to NAT and Port Forwarding

🔹Footprinting
        • Types of Footprinting
        • Footprinting Tools
        • Google Hacking
        • Footprinting with Social Engineering
        • Footprinting Countermeasures

🔹Scanning
        • Scanning Methodology
        • Banner Grabbing
        • Evading IDS and Firewalls
        • Vulnerability Scanning
        • Mapping Networks
        • Scanning Countermeasures

🔹Enumeration
        • Basics and overview
        • Techniques of enumeration
        • NetBIOS Enumeration
        • SNMP Enum
        • LDAP Enum
        • DNS Enum
        • SMB Enum
        • NTP Enum
        • Enumeration Countermeasures

🔹System Hacking
        • Introduction
        • Password Cracking
        • NetBIOS Enumeration
        • MetaSploit
        • Windows Pentesting
        • Privilege Escalation
        • Executing Applications
        • Hiding Files
        • Covering Tracks
        • Countermeasures
 
🔹Malwares
        • Malware concepts
        • Viruses
        • Ransomwares
        • Worms
        • Trojans
        • Malware Detection
        • Malware Analysis
        • Countermeasures


🔹Sniffing and Spoofing
        • Sniffing concepts
        • MAC Attacks
        • DHCP Attacks
        • IP Spoofing
        • ARP Poisoning
        • Spoofing Attacks
        • DNS Poisoning
        • Sniffing Tools
        • Countermeasures

🔹Social Engineering
        • SE Concepts
        • SE Techniques
        • Identity thefts
        • SE Tools
        • SE Countermeasures

🔹Denial of Service
        • DoS/DDoS Concepts
        • DoS attack techniques
        • Botnet
        • Attack tools
        • Countermeasures

🔹Session Hijacking
        • Concepts
        • Application level session hijacking
        • Network level session hijacking
        • Session Hijacking tools
        • Countermeasures

🔹Hacking Web Servers
        • Web server concepts
        • Webserver Attacks
        • Attack Methodology
        • Web server attack tools
        • Countermeasures

🔹Hacking Web Applications
        • Firewalls
        • Intrusion Detection/Prevention Systems
        • Honeypots
        • Evading IDS
        • Evading Firewalls (Bitvise)

🔹IDS, Firewalls and Honeypotss
        • Web server concepts
        • Webserver Attacks
        • Attack Methodology
        • Web server attack tools
        • Countermeasures

🔹Wireless Pentesting
        • Wireless Concepts
        • Wireless Encryption
        • Wireless threats
        • Wireless Hacking Methodology
        • Wireless hacking tools
        • Countermeasures
        • Wireless Security tools

🔹Mobile Platform Pentesting
        • Mobile attack vectors
        • Hacking Android OS
        • Hacking iOS
        • Mobile Security Guidelines and tools

🔹Cryptography
        • Cryptography concepts
        • Encryption algorithms
        • Cryptography tools
        • Public Key Infrastructure
        • Cryptanalysis

🔹Cloud Computing
        • Cloud Computing concepts
        • Cloud Computing threats
        • Cloud Computing attacks
        • Cloud security
        • AWS Demo

🔹Forensics
        • Computer Forensics
        • Investigation Process
        • Incident Response
        • Hard Disks and File systems
        • Windows Forensics
        • Linux Forensics
        • Mobile forensics
        • Digital Forensic Tools
        • Digital Forensics with Autopsy
        • Forensic Reporting

Reserve Your Free Demo