Cyber Security Certification Training

Duration: 4 Days
Hours: 24 Hours
Training Level: All Level
Recorded
Single Attendee
$299.00 $499.00
6 month Access for Recorded

Cybersecurity & Ethical Hacking – Introduction

Need of Cybersecurity  

CIA Triad  

Security Architecture  

Security Governance  

Security Auditing  

Regulations & Frameworks  

Ethical Hacking  

Types of Hackers  

Phases of Ethical Hacking  

Penetration Testing  

Types of Penetration Testing  

Footprinting  

Objectives of Footprinting  

Types of Footprinting 

Cryptography

Types of cryptography  

Symmetric cryptography  

Asymmetric cryptography  

Hash functions  

Digital signatures  

Public Key Infrastructure (PKI)  

Attacks on cryptosystems  

Computer Networks & Security

Introduction to Computer Network  

Computer Networks - Architecture  

Layered architecture  

Open Systems Interconnect (OSI) Model  

Transmission Control Protocol/Internet Protocol (TCP/IP)  

Network Scanning  

Enumeration  

Common Network Threats/Attacks

Application and Web Security

Web server architecture  

Web server attacks  

Countermeasures and patch management  

Web application architecture  

Web application attacks  

IdAM (Identity and Access Management)

Authentication and authorization  

Authentication and authorization principles  

Regulation of access  

Access administration  

IdAM  

Password protection  

Identity theft  

Vulnerability Analysis & System Hacking

Vulnerability Analysis  

Types of Vulnerability Analysis  

Vulnerability Assessment Lifecycle  

Vulnerability Assessment Tools  

Vulnerability Scoring Systems  

Vulnerability Assessments Report  

System Hacking  

Password Cracking  

Privilege escalation  

Executing Applications  

Hiding Files  

Clearing Logs  

Sniffing and SQL Injection

Malware and its propagation ways  

Malware components  

Types of malware  

Concept of sniffing  

Types of sniffing  

Types of sniffing attacks  

SQL injection  

Types of SQL injection  

SQL injection Methodologies  

DoS and Session Hijacking

DoS attack  

DDoS attack  

Common symptoms of DoS/DDoS attack  

Categories of DoS/DDoS Attack Vectors  

DoS/DDoS detection techniques  

Session hijacking  

Application level session hijacking  

Network level session hijacking  

Intrusion Detection System (IDS)  

Types of Intrusion Detection Systems  

Introduction to Firewalls  

Types of Firewalls  

Introduction to Honeypots  

Evading IDS  

Curriculum
Total Duration: 24 Hours

Cybersecurity & Ethical Hacking – Introduction

Need of Cybersecurity  

CIA Triad  

Security Architecture  

Security Governance  

Security Auditing  

Regulations & Frameworks  

Ethical Hacking  

Types of Hackers  

Phases of Ethical Hacking  

Penetration Testing  

Types of Penetration Testing  

Footprinting  

Objectives of Footprinting  

Types of Footprinting 

Cryptography

Types of cryptography  

Symmetric cryptography  

Asymmetric cryptography  

Hash functions  

Digital signatures  

Public Key Infrastructure (PKI)  

Attacks on cryptosystems  

Computer Networks & Security

Introduction to Computer Network  

Computer Networks - Architecture  

Layered architecture  

Open Systems Interconnect (OSI) Model  

Transmission Control Protocol/Internet Protocol (TCP/IP)  

Network Scanning  

Enumeration  

Common Network Threats/Attacks

Application and Web Security

Web server architecture  

Web server attacks  

Countermeasures and patch management  

Web application architecture  

Web application attacks  

IdAM (Identity and Access Management)

Authentication and authorization  

Authentication and authorization principles  

Regulation of access  

Access administration  

IdAM  

Password protection  

Identity theft  

Vulnerability Analysis & System Hacking

Vulnerability Analysis  

Types of Vulnerability Analysis  

Vulnerability Assessment Lifecycle  

Vulnerability Assessment Tools  

Vulnerability Scoring Systems  

Vulnerability Assessments Report  

System Hacking  

Password Cracking  

Privilege escalation  

Executing Applications  

Hiding Files  

Clearing Logs  

Sniffing and SQL Injection

Malware and its propagation ways  

Malware components  

Types of malware  

Concept of sniffing  

Types of sniffing  

Types of sniffing attacks  

SQL injection  

Types of SQL injection  

SQL injection Methodologies  

DoS and Session Hijacking

DoS attack  

DDoS attack  

Common symptoms of DoS/DDoS attack  

Categories of DoS/DDoS Attack Vectors  

DoS/DDoS detection techniques  

Session hijacking  

Application level session hijacking  

Network level session hijacking  

Intrusion Detection System (IDS)  

Types of Intrusion Detection Systems  

Introduction to Firewalls  

Types of Firewalls  

Introduction to Honeypots  

Evading IDS