CYBER SECURTY ONLINE TRAINIG COURSE

INTRODUCTION & MODULES

  1. Fundamentals of Information Security

Covers the basics, prerequisites and fundamentals requires to understand the modules 2 through 7 coverage

  1. Incident Response & Threat Intelligence

Covers the security Incidents and its cycle with support of Threat Intelligence

  1. End-Point Security

Covers the minimal basic security technologies required for an organization protection

  1. Vulnerability & Risk Assessments

Covers how to identify, assess and mitigate the vulnerabilities and analyze the risks associated with them

  1. Security Testing

Module covers how to penetrate the systems, network and applications with various tools

  1. Computer Forensics

Teaches how to do forensic analysis on a compromised system, network along with mitigation strategy

  1. Cloud Security

Introduces the technology evolving into cloud platform and risks associated to it, to detect and prevent them

3

Module 1: Fundamentals of Information Security

Content Coverage Confidentiality, Integrity, Availability Authentication, Authorization & Accountability How security can be achieved: People, Process, Technology OSI layers: Attacks in layer wise Networking Concepts: IP Address, Subnets, Ports, Services, Network devices and functionality, Network Security devices and functionality Overview of Infrastructure: web servers, wireless, OS’s, etc functionality Risk (Vulnerability, Threat, Exploit, Asset, Impact) Terminologies Threats and Attack Types Cryptographic Basics: Overview of cryptology, Symmetric\Asymmetric keys, Hash, ciphers, SSL\TLS Words: False Positive, True Positive, false Positive, True Positive Network and Application vulnerabilities Basic introduction Security Testing: terminologies of sec testing Vulnerability and Risk Assessments Security Incident and Threat Intelligence Computer Forensics Introduction Mitigations, countermeasures, work around understanding CEH Tools and Assignments Overview of word terminologies used in all modules

4

Module 2: Incident Response & Threat Intelligence

Content Coverage:

Security Incident and categories Incident Response Life Cycle Security Incident and Event management SIEM-LAB Real Time use cases Threat Intelligent: Levels of TI Threat Intelligence Feeds Defense in Depth- Threat Intelligence support to Incident handling

Module 3: End-Point Security

Content Coverage:

Virus, Malwares and Trojans

Evading Techniques

Anti-Virus and Malware

Data Loss Prevention

Malware Analysis Detection & Prevention

Lab Exercise

Module 4: Vulnerability & Risk Assessments

5 Content Coverage: TCP/IP basics

NMAP & Wireshark – Analysis

Introduction to Nmap and its features

Port scanning with Nmap

OS and application version scanning

Nmap Scripting Engine (NSE)

Security Baseline

Creating a baseline policy for scan

Network & Application with tools and manual Assessment

Analysis of the reports

Risk Assessments

Lab Exercise

Module 5: Security Testing

Content Coverage: Course Introduction Business & Technical Logistics of Pen Testing Information Gathering Reconnaissance – Passive (External Only) Detecting Live Systems – Reconnaissance (Active) Banner Grabbing and Enumeration

Module 5: Security Testing Cont

6 Automated Vulnerability Assessment Hacking Operating Systems Evasion Techniques Hacking with PowerShell Networks and Sniffing Accessing and Hacking Web Techniques Mobile and IoT Hacking Report Writing Basics Linux Fundamentals OWASP Top 10 Application vulnerabilities

LAB: Introduction to Pen Testing Setup Linux Fundamentals Using Tools For Reporting Information Gathering Detecting Live Systems – Scanning Techniques Enumeration Vulnerability Assessments System Hacking – Windows System Hacking – Linux/Unix Hacking Advanced Vulnerability and Exploitation Techniques Network Sniffing/IDS Attacking Databases Attacking Web Applications

Module 6: Computer Forensics

Content Coverage: Computer Forensics Investigation Process

7 Understanding Hard Disks and File Systems Data Acquisition and Duplication Operating System Forensics Network Forensics Malware Forensics Investigating Web Attacks Forensics Report Writing and Presentation

Module 7: Cloud Security

Content Coverage: Introduction and scope Cloud models and deployment solutions Cloud Security Threats Architecture Review Cloud Security checklist and testing

CONTACT US