Saturday, 7 September 2019

Cybersecurity Professional online training


Cybersecurity Professional  course contents

 For Free demo 


Raavi Raja
APEX | Office#403, PSR Prime Towers | Gachibowli | Hyderabad|India
(M): +91-8500-122-107 ,(whats app)
| USA(L):+1 (214)-628-3894
Gtalk: raavi.sriraja@gmail.com
Email: raj@apex-online-it-training.com
WebSite:www.apex-online-it-training.com
Go Green Save Earth Save water 



Module 1: Security Risk Assessment (Ethical Hacking)
Introduction to Ethical Hacking
  • What is Hacking
  • What is Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing
Footprinting
  • What is FootPrinting
  • Footprinting Techniques
  • Footprinting Website & Tools
Scanning
  • What is Network scanning
  • Types of Scanners
  • Vulnerability Scanner Tools
Proxy
  • What is a proxy server
  • Types of proxies
  • What is a Darkweb
  • Why hackers prefer to use Darkweb


Hacking Web Servers & Web Applications
  • What is a web server
  • Types of web attacks
Session Hijacking
  • What is session hijacking
  • Session hijacking Techniques
  • Session hijacking Tools
Denial of Service
  • What is a DoS and DDoS attack
  • DoS attack techniques
  • DoS attack Tools
System Hacking
  • What is System Hacking
  • What is Password Cracking
  • Password Cracking techniques
  • Password Cracking Website & Tools
Sniffers
  • What is a sniffer
  • Sniffing Techniques
  • Sniffing Tools
Phishing
  • What is Phishing
  • Phishing Techniques
  • Phishing Tools
Malware
  • What is malware
  • Types of malware
  • Malware creation Tools
  • USB password stealers
Wireless Hacking
  • Types of wireless networks
  • Wireless Hacking Techniques
  • Wireless Hacking Tools
Kali Linux
  • What is Kali Linux
  • Kali Linux Tools
Module 2: Proactive Defence and Countermeasures
Introduction to Security
  • What is security?
  • Layer 1 Security
  • Layer 2 Security
  • Layer 3 security
Firewalls
  • What is a Firewall?
  • Types of firewalls
  • Designing Security with Firewalls
  • NAT
  • Security Policy
  • Logs Management
  • Application Security
  • Content / Web Security
  • Authentication
Virtual Private Networks
  • What is VPNs
  • Type of VPNs
  • GRE
  • IPSEC
  • SSL
Intrusion Prevention Systems
  • What is an Intrusion Detection System?
  • What is an Intrusion Prevention System?
High Availability
Virtual / Cloud Devices Security
Host Security
  • OS Hardening
  • Patch management
  • Antivirus
  • Endpoint Security
Module 3: Incident Response and Management
SIEM
  • Introduction to SIEM
  • SIEM Architecture
  • Events and Logs
  • Event Correlation and Event Collection
  • Correlation Rules
  • Forensic Data
  • SIEM Deployment
Incident Response
  • Introduction Incident Response
  • Incident Response Policy
  • Incident Handling
  • Forensics of Incident response
  • Inside Threat
  • Incident Recovery
  • Malware Analysis
Mobile Forensics
  • Forensic Acquisition of Smartphones
  •  
    1. Logical Acquisition
    2. File System Acquisition
    3. Physical Acquisition
  • Android Forensics
  • Retrieving User Activity Information from Android Devices
  • iOS (iPhone) Forensics
  • Retrieving User Activity Information iOS Devices


No comments:

Post a Comment