Cybersecurity Professional course contents
Raavi Raja
APEX | Office#403, PSR Prime Towers | Gachibowli | Hyderabad|India
(M): +91-8500-122-107 ,(whats app)
| USA(L):+1 (214)-628-3894
Gtalk: raavi.sriraja@gmail.com
Email: raj@apex-online-it-training.com
WebSite:www.apex-online-it-training.com
Go Green Save Earth Save water
Module 1: Security Risk
Assessment (Ethical Hacking)
Introduction to Ethical
Hacking
- What is Hacking
- What is Ethical Hacking
- What is Penetration Testing
- What is Vulnerability Auditing
Footprinting
- What is FootPrinting
- Footprinting Techniques
- Footprinting Website &
Tools
Scanning
- What is Network scanning
- Types of Scanners
- Vulnerability Scanner Tools
Proxy
- What is a proxy server
- Types of proxies
- What is a Darkweb
- Why hackers prefer to use
Darkweb
Hacking Web Servers &
Web Applications
- What is a web server
- Types of web attacks
Session Hijacking
- What is session hijacking
- Session hijacking Techniques
- Session hijacking Tools
Denial of Service
- What is a DoS and DDoS attack
- DoS attack techniques
- DoS attack Tools
System Hacking
- What is System Hacking
- What is Password Cracking
- Password Cracking techniques
- Password Cracking Website &
Tools
Sniffers
- What is a sniffer
- Sniffing Techniques
- Sniffing Tools
Phishing
- What is Phishing
- Phishing Techniques
- Phishing Tools
Malware
- What is malware
- Types of malware
- Malware creation Tools
- USB password stealers
Wireless Hacking
- Types of wireless networks
- Wireless Hacking Techniques
- Wireless Hacking Tools
Kali Linux
- What is Kali Linux
- Kali Linux Tools
Module 2: Proactive Defence
and Countermeasures
Introduction to Security
- What is security?
- Layer 1 Security
- Layer 2 Security
- Layer 3 security
Firewalls
- What is a Firewall?
- Types of firewalls
- Designing Security with
Firewalls
- NAT
- Security Policy
- Logs Management
- Application Security
- Content / Web Security
- Authentication
Virtual Private Networks
- What is VPNs
- Type of VPNs
- GRE
- IPSEC
- SSL
Intrusion Prevention
Systems
- What is an Intrusion Detection
System?
- What is an Intrusion Prevention
System?
High Availability
Virtual / Cloud Devices Security
Host Security
- OS Hardening
- Patch management
- Antivirus
- Endpoint Security
Module 3: Incident Response
and Management
SIEM
- Introduction to SIEM
- SIEM Architecture
- Events and Logs
- Event Correlation and Event
Collection
- Correlation Rules
- Forensic Data
- SIEM Deployment
Incident Response
- Introduction Incident Response
- Incident Response Policy
- Incident Handling
- Forensics of Incident response
- Inside Threat
- Incident Recovery
- Malware Analysis
Mobile Forensics
- Forensic Acquisition of
Smartphones
- Logical Acquisition
- File System Acquisition
- Physical Acquisition
- Android Forensics
- Retrieving User Activity
Information from Android Devices
- iOS (iPhone) Forensics
- Retrieving User Activity
Information iOS Devices
No comments:
Post a Comment