Cybersecurity & Ethical Hacking – Introduction
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Footprinting
Objectives of Footprinting
Types of Footprinting
Cryptography
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Hash functions
Digital signatures
Public Key Infrastructure (PKI)
Attacks on cryptosystems
Computer Networks & Security
Introduction to Computer Network
Computer Networks - Architecture
Layered architecture
Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Network Scanning
Enumeration
Common Network Threats/Attacks
Application and Web Security
Web server architecture
Web server attacks
Countermeasures and patch management
Web application architecture
Web application attacks
IdAM (Identity and Access Management)
Authentication and authorization
Authentication and authorization principles
Regulation of access
Access administration
IdAM
Password protection
Identity theft
Vulnerability Analysis & System Hacking
Vulnerability Analysis
Types of Vulnerability Analysis
Vulnerability Assessment Lifecycle
Vulnerability Assessment Tools
Vulnerability Scoring Systems
Vulnerability Assessments Report
System Hacking
Password Cracking
Privilege escalation
Executing Applications
Hiding Files
Clearing Logs
Sniffing and SQL Injection
Malware and its propagation ways
Malware components
Types of malware
Concept of sniffing
Types of sniffing
Types of sniffing attacks
SQL injection
Types of SQL injection
SQL injection Methodologies
DoS and Session Hijacking
DoS attack
DDoS attack
Common symptoms of DoS/DDoS attack
Categories of DoS/DDoS Attack Vectors
DoS/DDoS detection techniques
Session hijacking
Application level session hijacking
Network level session hijacking
Intrusion Detection System (IDS)
Types of Intrusion Detection Systems
Introduction to Firewalls
Types of Firewalls
Introduction to Honeypots
Evading IDS
Cybersecurity & Ethical Hacking – Introduction
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Footprinting
Objectives of Footprinting
Types of Footprinting
Cryptography
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Hash functions
Digital signatures
Public Key Infrastructure (PKI)
Attacks on cryptosystems
Computer Networks & Security
Introduction to Computer Network
Computer Networks - Architecture
Layered architecture
Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Network Scanning
Enumeration
Common Network Threats/Attacks
Application and Web Security
Web server architecture
Web server attacks
Countermeasures and patch management
Web application architecture
Web application attacks
IdAM (Identity and Access Management)
Authentication and authorization
Authentication and authorization principles
Regulation of access
Access administration
IdAM
Password protection
Identity theft
Vulnerability Analysis & System Hacking
Vulnerability Analysis
Types of Vulnerability Analysis
Vulnerability Assessment Lifecycle
Vulnerability Assessment Tools
Vulnerability Scoring Systems
Vulnerability Assessments Report
System Hacking
Password Cracking
Privilege escalation
Executing Applications
Hiding Files
Clearing Logs
Sniffing and SQL Injection
Malware and its propagation ways
Malware components
Types of malware
Concept of sniffing
Types of sniffing
Types of sniffing attacks
SQL injection
Types of SQL injection
SQL injection Methodologies
DoS and Session Hijacking
DoS attack
DDoS attack
Common symptoms of DoS/DDoS attack
Categories of DoS/DDoS Attack Vectors
DoS/DDoS detection techniques
Session hijacking
Application level session hijacking
Network level session hijacking
Intrusion Detection System (IDS)
Types of Intrusion Detection Systems
Introduction to Firewalls
Types of Firewalls
Introduction to Honeypots
Evading IDS