CYBER SECURITY: (6 Months)

Description

The course will provide the students elementary knowledge and skills related to cyber security. It will cover the security of networks, operating system, types of web-attacks and prevention of these attacks. It will provide the knowledge of continuity of operations and controlling the malware in systems and mobile devices.

What will you learn
  • Knowledge Proficiency Details

  • • Knowledge of Information technology catering principles and Capabilities with particular-emphasis on the technical support of local area networks.

  • • Knowledge of securing networks, systems, servers and operating Systems with troubleshooting.

  • • Knowledge of the web attacks in modern day servers

  • Skills Proficiency Details

  • • Hands on experience in pen-testing all network technologies regarding with local area network.

  • • Perform various tests to detect and provide defense against vulnerabilities.

  • • Practical scenarios to compromise web servers and web applications.

  • • Ability to detect attack vectors, identify attack type and provide continuity of operations.

  • • Ability to recover data from damaged disks to ensure data consistency.

  • • Capable of malware analysis to detect basic working of malwares.

  • • Pentesting mobile devices and applications.


Requirements
  • Bachelors and Graduation (14 or 16 years non-relevant to CS programs)

Lessons

  • 48 Lessons
  • 00:00:00 Hours
  • • Introduction to Cybersecurity
  • Objectives, Roles, Differences between Information security and cybersecurity
  • What is Cyberspace? What is Cyber security? Why is Cyber security Important?
  • About Kali Linux, Different flavor of Linux for Hacking, and pentesting
  • Virtualization and OS installations, Current Security Landscape
  • Common Security Principles, Security for SOHO, Data Center,
  • Cloud and virtual environment Kali and Parrot Linux
  • Directory Structure, Basic and admin commands, Variables and User Profiles
  • Windows CMD commands, PowerShell, Windows Registry, Commands Alias and Links Secure Access Management, Compare In-band and out-of-band management
  • Protection/Hardening of management plane, Configure and verify secure access through SNMP v3 User manage management in window Linux User and groups
  • File and folder permission in Linux, ACL and Special Permissions, NTFS permissions in Windows, Data Sharing with SMB
  • Cisco ASA Product Family, Overview and Design, Introducing the Cisco ASA 5500-, X Series Next Generation
  • Firewalls, Introducing Cisco ASAv New, Features, Installation of ASA 9.61v and its management via Cisco ASDM Service management with systemctl
  • Automate jobs with Crontab and window scheduler, Windows Defender and real time
  • Virus protection Linux and Window Firewall, Window Defender and Real time
  • Virus protections, Iptables firewall and inbound and outbound traffic rules Ipforwarding and MASQUERADE
  • New firewall ( Firewalld ), /etc/security and TCP Wrapper
  • Selinux Booleans and Rules, Password Policy with PAM
  • Traffic redirections rules, Cisco ASA Firewall Technologies, Basic Firewall initialization using CLI and ASDM
  • Firewall Access Control Disk Management, SWAP and LVM Partitions, Windows Disk MGT tool Basic T.Shoot of Linux
  • NAT on ASA (IPv4 / IPv6), Object/Auto NAT, Manual or Twice NAT, Source Based vs Destination based NAT
  • NAT traversal Windows CMD commands, PowerShell, Linux Shell and variables
  • .bat Script, .sh Script, Basic python scripts and Basic of PHP Routing on ASA
  • Static / Default, Dynamic Routing protocols, VLANs and sub-interfaces in ASA
  • Secure DMZ Design & implementation Apache and Nginx Web Server
  • IIS Web Server XAMP and LAMP, Mail Server with SMTP/POP/IMAP
  • ASA Firewall High Availability Active-Passive deployment, Active-Active deployment
  • Redundant Interfaces, Aggregated Interfaces Encryption, Decryption, Encoding, Decoding Hashing, Public and Private Key, SSL , TLS, PKI, Email Encryption, About steganography and Homography
  • Hashing, Public and Private Key, SSL , TLS, PKI, Email Encryption, About steganography and Homography
  • Hide data with in picture and video, Hide payload with in picture and .pdf documents
  • Executable .bat script hide with in and documents and pictures Concepts of homography
  • Homography attack with Phishing Countermeasures
  • Modular Policy Framework, ASA Clustering, Spanned-EtherChannel, Interface mode Windows Password Break
  • Windows Password Cracking, Linux Password Break and Cracking .pdf and .rar file Password, Cracking Bios Password, Mobile Password Breaking, Cisco ASA FirePOWER / Cisco FTD
  • Evolution, Deployment Models, Initial Setup / Boot strapping Describe the elements of information security, Explain information security, threats and attack vectors
  • concepts and scope, Understand the information, security controls (information) defense-in-depth, policies, procedures, awareness, physical, management process, and risk
  • Understand the penetration, testing process, Fire POWER Traffic flow, FirePOWER Access Policy, Components, Security Zones
  • Creating Individual Objects and Groups Describe the network scanning concepts
  • Use various scanning tools, Perform scanning to check for live systems and open ports
  • Perform scanning by using various scanning techniques, Scan beyond intrusion detection, system (IDS) and firewall
  • Perform banner grabbing, Draw network diagrams using network discovery tools
  • Perform scanning penetration testing
  • Describe the enumeration concepts, Explain different techniques for Netbios enumeration, Explain different techniques for SNMP enumeration Explain different techniques for LDAP enumeration
  • Explain different techniques for NTP enumeration, Explain different techniques for SMTP and DNS enumeration, Explain other enumerations such as IPsec, VolP, RPC, and Linux/Unix enum Apply enumeration countermeasures
  • Perform enumeration penetration testing
  • Pre-filter policy in Cisco FTD, Filtering based on Networks / Ports, Filtering based on Web URLs, Filtering based on Applications (AVC)
  • Exploring the Surface, Deep & Dark Web, Ethics and Legality, The Onion Router (TOR)
  • The Hidden Internet Project (I2P), Deep & Dark Web Search Engines

About instructor

Instructor
Name : Yousuf Ali
Reviews : 0 Reviews
Student : 1 Students
Courses : 9 Courses

Reviews

0
Based on 0 Reviews
1 Stars
2 Stars
3 Stars
4 Stars
5 Stars

Contact us