CYBER SECURITY: (6 Months)
Description
The course will provide the students elementary knowledge and skills related to cyber security. It will cover the security of networks, operating system, types of web-attacks and prevention of these attacks. It will provide the knowledge of continuity of operations and controlling the malware in systems and mobile devices.
What will you learn
-
Knowledge Proficiency Details
-
• Knowledge of Information technology catering principles and Capabilities with particular-emphasis on the technical support of local area networks.
-
• Knowledge of securing networks, systems, servers and operating Systems with troubleshooting.
-
• Knowledge of the web attacks in modern day servers
-
Skills Proficiency Details
-
• Hands on experience in pen-testing all network technologies regarding with local area network.
-
• Perform various tests to detect and provide defense against vulnerabilities.
-
• Practical scenarios to compromise web servers and web applications.
-
• Ability to detect attack vectors, identify attack type and provide continuity of operations.
-
• Ability to recover data from damaged disks to ensure data consistency.
-
• Capable of malware analysis to detect basic working of malwares.
-
• Pentesting mobile devices and applications.
Requirements
- Bachelors and Graduation (14 or 16 years non-relevant to CS programs)
Lessons
- 48 Lessons
- 00:00:00 Hours
- • Introduction to Cybersecurity
- Objectives, Roles, Differences between Information security and cybersecurity
- What is Cyberspace? What is Cyber security? Why is Cyber security Important?
- About Kali Linux, Different flavor of Linux for Hacking, and pentesting
- Virtualization and OS installations, Current Security Landscape
- Common Security Principles, Security for SOHO, Data Center,
- Cloud and virtual environment Kali and Parrot Linux
- Directory Structure, Basic and admin commands, Variables and User Profiles
- Windows CMD commands, PowerShell, Windows Registry, Commands Alias and Links Secure Access Management, Compare In-band and out-of-band management
- Protection/Hardening of management plane, Configure and verify secure access through SNMP v3 User manage management in window Linux User and groups
- File and folder permission in Linux, ACL and Special Permissions, NTFS permissions in Windows, Data Sharing with SMB
- Cisco ASA Product Family, Overview and Design, Introducing the Cisco ASA 5500-, X Series Next Generation
- Firewalls, Introducing Cisco ASAv New, Features, Installation of ASA 9.61v and its management via Cisco ASDM Service management with systemctl
- Automate jobs with Crontab and window scheduler, Windows Defender and real time
- Virus protection Linux and Window Firewall, Window Defender and Real time
- Virus protections, Iptables firewall and inbound and outbound traffic rules Ipforwarding and MASQUERADE
- New firewall ( Firewalld ), /etc/security and TCP Wrapper
- Selinux Booleans and Rules, Password Policy with PAM
- Traffic redirections rules, Cisco ASA Firewall Technologies, Basic Firewall initialization using CLI and ASDM
- Firewall Access Control Disk Management, SWAP and LVM Partitions, Windows Disk MGT tool Basic T.Shoot of Linux
- NAT on ASA (IPv4 / IPv6), Object/Auto NAT, Manual or Twice NAT, Source Based vs Destination based NAT
- NAT traversal Windows CMD commands, PowerShell, Linux Shell and variables
- .bat Script, .sh Script, Basic python scripts and Basic of PHP Routing on ASA
- Static / Default, Dynamic Routing protocols, VLANs and sub-interfaces in ASA
- Secure DMZ Design & implementation Apache and Nginx Web Server
- IIS Web Server XAMP and LAMP, Mail Server with SMTP/POP/IMAP
- ASA Firewall High Availability Active-Passive deployment, Active-Active deployment
- Redundant Interfaces, Aggregated Interfaces Encryption, Decryption, Encoding, Decoding Hashing, Public and Private Key, SSL , TLS, PKI, Email Encryption, About steganography and Homography
- Hashing, Public and Private Key, SSL , TLS, PKI, Email Encryption, About steganography and Homography
- Hide data with in picture and video, Hide payload with in picture and .pdf documents
- Executable .bat script hide with in and documents and pictures Concepts of homography
- Homography attack with Phishing Countermeasures
- Modular Policy Framework, ASA Clustering, Spanned-EtherChannel, Interface mode Windows Password Break
- Windows Password Cracking, Linux Password Break and Cracking .pdf and .rar file Password, Cracking Bios Password, Mobile Password Breaking, Cisco ASA FirePOWER / Cisco FTD
- Evolution, Deployment Models, Initial Setup / Boot strapping Describe the elements of information security, Explain information security, threats and attack vectors
- concepts and scope, Understand the information, security controls (information) defense-in-depth, policies, procedures, awareness, physical, management process, and risk
- Understand the penetration, testing process, Fire POWER Traffic flow, FirePOWER Access Policy, Components, Security Zones
- Creating Individual Objects and Groups Describe the network scanning concepts
- Use various scanning tools, Perform scanning to check for live systems and open ports
- Perform scanning by using various scanning techniques, Scan beyond intrusion detection, system (IDS) and firewall
- Perform banner grabbing, Draw network diagrams using network discovery tools
- Perform scanning penetration testing
- Describe the enumeration concepts, Explain different techniques for Netbios enumeration, Explain different techniques for SNMP enumeration Explain different techniques for LDAP enumeration
- Explain different techniques for NTP enumeration, Explain different techniques for SMTP and DNS enumeration, Explain other enumerations such as IPsec, VolP, RPC, and Linux/Unix enum Apply enumeration countermeasures
- Perform enumeration penetration testing
- Pre-filter policy in Cisco FTD, Filtering based on Networks / Ports, Filtering based on Web URLs, Filtering based on Applications (AVC)
- Exploring the Surface, Deep & Dark Web, Ethics and Legality, The Onion Router (TOR)
- The Hidden Internet Project (I2P), Deep & Dark Web Search Engines