Setup Menus in Admin Panel

Cybersecurity Professional Training

$250.00

Category:

Description

Cybersecurity Professional 

 This course is mapped to the popular Cybersecurity Professional course .This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with best standards, this course is entirely hands on and real time oriented.  This course consists of three modules viz

1) Security Risk Assessment (Ethical Hacking)

2) Proactive Defense and Countermeasures

3) Incident Response and Management

Security Risk Assessment

Dos and DDos Attacks

Attack Mitigation Techniques

Firewalls, IDS, IPS

Cryptography

Incident Response and Management

Log Analysis

Forensics

Cybersecurity Professional Training – Course Curriculum

Module 1: Security Risk Assessment (Ethical Hacking)

Introduction to Ethical Hacking

What is Hacking

What is Ethical Hacking

What is Penetration Testing

What is Vulnerability Auditing

Footprinting

What is FootPrinting

Footprinting Techniques

Footprinting Website & Tools

Scanning

What is Network scanning

Types of Scanners

Vulnerability Scanner Tools

Proxy

What is a proxy server

Types of proxies

What is a Darkweb

Why hackers prefer to use Darkweb

Hacking Web Servers & Web

Applications

What is a web server

Types of web attacks

Session Hijacking

What is session hijacking

Session hijacking Techniques

Session hijacking Tools

Denial of Service

What is a DoS and DDoS attack

DoS attack techniques

DoS attack Tools

System Hacking

What is System Hacking

What is Password Cracking

Password Cracking techniques

Password Cracking Website & Tools

Sniffers

What is a sniffer

Sniffing Techniques

Sniffing Tools

Phishing

What is Phishing

Phishing Techniques

Phishing Tools

Malware

What is malware

Types of malware

Malware creation Tools

USB password stealers

Wireless Hacking

Types of wireless networks

Wireless Hacking Techniques

Wireless Hacking Tools

Kali Linux

What is Kali Linux

Kali Linux Tools

Module 2: Proactive Defence and Countermeasures

Introduction to Security

What is security?

Layer 1 Security

Layer 2 Security

Layer 3 security

Firewalls

What is a Firewall?

Types of firewalls

Designing Security with Firewalls

NAT

Security Policy

Logs Management

Application Security

Content / Web Security

Authentication

Virtual Private Networks

What is VPNs

Type of VPNs

GRE

IPSEC

SSL

Intrusion Prevention Systems

What is an Intrusion Detection

System?

What is an Intrusion Prevention

System?

High Availability

Virtual / Cloud Devices Security

Host Security

OS Hardening

Patch management

Antivirus

Endpoint Security

Module 3: Incident Response and Management

SIEM

Introduction to SIEM

SIEM Architecture

Events and Logs

Event Correlation and Event

Collection

Correlation Rules

Forensic Data

SIEM Deployment

Incident Response

Introduction Incident Response

Incident Response Policy

Incident Handling

Forensics of Incident response

Inside Threat

Incident Recovery

Malware Analysis

Mobile Forensics

Forensic Acquisition of

Smartphones

Logical Acquisition

File System Acquisition

Physical Acquisition

-Android Forensics

-Retrieving User Activity Information

from Android Devices

iOS (iPhone) Forensics

Retrieving User Activity Information

iOS Devices

Duration & Timings :

Duration – 30 Hours.

Training Type: Instructor Led Live Interactive Sessions.

Faculty: Experienced.

Weekday Session – Mon – Thu 8:30 PM to 10:30 PM (EST) – 4 Weeks. May 23, 2022.

Weekend Session – Sat & Sun  9:30 AM – 12:30 PM (EST) – 5 Weeks. June 11, 2022 .

 Inquiry Now         Discount Offer 

USA: +1 734 418 2465 | India: +91 40 4018 1306

Reviews

There are no reviews yet.

Be the first to review “Cybersecurity Professional Training”

LEARNTEK

© 2019 LEARNTEK. ALL RIGHTS RESERVED | Privacy Policy | Terms & Conditions



USA: +1 734 418 2465 | info@learntek.org Discount Offer
Season's Best Discount Offer End's in
Discount Offer