Description
Cybersecurity Professional
This course is mapped to the popular Cybersecurity Professional course .This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with best standards, this course is entirely hands on and real time oriented. This course consists of three modules viz
1) Security Risk Assessment (Ethical Hacking)
2) Proactive Defense and Countermeasures
3) Incident Response and Management
Security Risk Assessment
Dos and DDos Attacks
Attack Mitigation Techniques
Firewalls, IDS, IPS
Cryptography
Incident Response and Management
Log Analysis
Forensics
Cybersecurity Professional Training – Course Curriculum
Module 1: Security Risk Assessment (Ethical Hacking)
Introduction to Ethical Hacking
What is Hacking
What is Ethical Hacking
What is Penetration Testing
What is Vulnerability Auditing
Footprinting
What is FootPrinting
Footprinting Techniques
Footprinting Website & Tools
Scanning
What is Network scanning
Types of Scanners
Vulnerability Scanner Tools
Proxy
What is a proxy server
Types of proxies
What is a Darkweb
Why hackers prefer to use Darkweb
Hacking Web Servers & Web
Applications
What is a web server
Types of web attacks
Session Hijacking
What is session hijacking
Session hijacking Techniques
Session hijacking Tools
Denial of Service
What is a DoS and DDoS attack
DoS attack techniques
DoS attack Tools
System Hacking
What is System Hacking
What is Password Cracking
Password Cracking techniques
Password Cracking Website & Tools
Sniffers
What is a sniffer
Sniffing Techniques
Sniffing Tools
Phishing
What is Phishing
Phishing Techniques
Phishing Tools
Malware
What is malware
Types of malware
Malware creation Tools
USB password stealers
Wireless Hacking
Types of wireless networks
Wireless Hacking Techniques
Wireless Hacking Tools
Kali Linux
What is Kali Linux
Kali Linux Tools
Module 2: Proactive Defence and Countermeasures
Introduction to Security
What is security?
Layer 1 Security
Layer 2 Security
Layer 3 security
Firewalls
What is a Firewall?
Types of firewalls
Designing Security with Firewalls
NAT
Security Policy
Logs Management
Application Security
Content / Web Security
Authentication
Virtual Private Networks
What is VPNs
Type of VPNs
GRE
IPSEC
SSL
Intrusion Prevention Systems
What is an Intrusion Detection
System?
What is an Intrusion Prevention
System?
High Availability
Virtual / Cloud Devices Security
Host Security
OS Hardening
Patch management
Antivirus
Endpoint Security
Module 3: Incident Response and Management
SIEM
Introduction to SIEM
SIEM Architecture
Events and Logs
Event Correlation and Event
Collection
Correlation Rules
Forensic Data
SIEM Deployment
Incident Response
Introduction Incident Response
Incident Response Policy
Incident Handling
Forensics of Incident response
Inside Threat
Incident Recovery
Malware Analysis
Mobile Forensics
Forensic Acquisition of
Smartphones
Logical Acquisition
File System Acquisition
Physical Acquisition
-Android Forensics
-Retrieving User Activity Information
from Android Devices
iOS (iPhone) Forensics
Retrieving User Activity Information
iOS Devices
Duration & Timings :
Duration – 30 Hours.
Training Type: Instructor Led Live Interactive Sessions.
Faculty: Experienced.
Weekday Session – Mon – Thu 8:30 PM to 10:30 PM (EST) – 4 Weeks. October 14, 2024.
Weekend Session – Sat & Sun 1:00 PM to 4:00 PM (EST) – 5 Weeks. November 2, 2024.
Weekday Session – Mon – Thu 8:30 PM to 10:30 PM (EST) – 4 Weeks. November 18, 2024.
CYBERSECURITY REVIEWS
Inquiry Now Discount Offer
USA: +1 734 418 2465 | India: +91 40 4018 1306
Reviews
There are no reviews yet.