Monday, December 5, 2022

Cyber Security Training and Internship

This Program is meant for those who are looking for comprehensive and practical knowledge in the Cyber Security domain. This is the course that teaches both hacking and prevention techniques and maintaining industry standards. This course is entirely hand’s on and real-time-oriented.

ABOUT COURSE

60 Hours of Training

2.5 Months of Training & 6 Months of Virtual Internship

Learn from Industry Experts

Job Assistance

Real-World Projects & Cases During Internship

WHY US?

Learn from Cyber Security Experts

Learn from Experienced Industry Experts Working for BSNL, Kinsta, Bank of Singapore, etc. Instructor led live sessions.

Hands-on Demonstration

Learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM, vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations.

6 Months of Virtual Internship

6 Months of Virtual Internship Where You Will Work on Real-World Projects & Cases. You will get an internship certificate after completing all the tasks during the internship.

YOUR LEARNING JOURNY

  • Instructor-led Live Sessions
  • Classes on Google Classroom
  • Access to Classroom Recordings
  • Access to Our Community for Knowledge Sharing
  • Assignment & Quizzes

PREREQUISITES

  • Bachelor’s Degree in Any Field
  • Understanding of Computer Systems
  • A Computer Having At least 4GB of RAM & Corei5 Processor with Active Internet Connection

COURSE PRICE AT

INR 14995
Instructor-led Cyber Security Training Course live online classes
  • Pay Using Credit Card / Debit Card / Internet Banking / UPI
  • No Cost EMI

COURSE SYLLABUS

Information Security and Ethical Hacking Overview

Information Security Overview, Cyber Kill Chain Concepts, Hacking Concepts, Ethical Hacking Concepts, Information Security Controls, Information Security Laws and Standards

Footprinting and Reconnaissance

Footprinting Concepts, Footprinting Methodology, Footprinting through Search Engines, Footprinting through Web Services, Footprinting through Social Networking Sites, Website Footprinting, Email Footprinting, Whois Footprinting, DNS Footprinting, Network Footprinting, Footprinting through Social Engineering, Footprinting Tools, Footprinting Countermeasures

Scanning Networks

Network Scanning Concepts, Scanning Tools, Host Discovery, Port and Service Discovery, OS Discovery (Banner Grabbing/OS Fingerprinting), Scanning Beyond IDS and Firewall, Draw Network Diagrams

Enumeration

Enumeration Concepts, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, NTP and NFS Enumeration, SMTP and DNS Enumeration, Other Enumeration Techniques (IPsec, VoIP, RPC, Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP enumeration), Enumeration Countermeasures

Vulnerability Analysis

Vulnerability Assessment Concepts, Vulnerability Classification and Assessment Types, Vulnerability Assessment Solutions and Tools, Vulnerability Assessment Reports

System Hacking

System Hacking Concepts, Gaining Access, Cracking Passwords, Vulnerability Exploitation, Escalating Privileges, Maintaining Access, Executing Applications, Hiding Files, Clearing Logs

Sniffing

Sniffing Concepts, Sniffing Technique: MAC Attacks, Sniffing Technique: DHCP Attacks, Sniffing Technique: ARP Poisoning, Sniffing Technique: Spoofing Attacks, Sniffing Technique: DNS Poisoning, Sniffing Tools, Sniffing Countermeasures, Sniffing Detection Techniques

Social Engineering

Social Engineering Concepts, Social Engineering Techniques, Insider Threats, Impersonation on Social, Networking Sites, Identity Theft, Social Engineering Countermeasures

Denial-of-Service

DoS/DDoS Concepts, DoS/DDoS Attack Techniques, Botnets, DDoS, Case Study, DoS/DDoS Attack Tools, DoS/DDoS Countermeasures, DoS/DDoS Protection Tools

Session Hijacking

Session Hijacking Concepts, Application Level Session Hijacking, Network Level Session Hijacking, Session Hijacking Tools, Session Hijacking Countermeasures

Evading IDS, Firewalls, and Honeypots

IDS, IPS, Firewall, and Honeypot Concepts, IDS, IPS, Firewall, and Honeypot Solutions, Evading IDS, Evading Firewalls, IDS/Firewall Evading Tools, Detecting Honeypots, IDS/Firewall Evasion Countermeasures,

Hacking Web Servers

Web Server Concepts, Web Server Attacks, Web Server Attack Methodology, Web Server Attack Tools, Web Server Countermeasures, Patch Management, Web Server Security Tools

Hacking Web Applications

Web App Concepts, Web App Threats, Web App Hacking Methodology, Footprint Web Infrastructure, Analyze Web Applications, Bypass Client-Side Controls, Attack Authentication Mechanism, Attack Authorization Schemes, Attack Access Controls, Attack Session Management Mechanism, Preform Injection Attacks, Attack Application Logic Flaws, Attack Shared Environments, Attack Database Connectivity, Attack Web App Client, Attack Web Services, Web API, Webhooks, and Web Shell, Web App Security

SQL Injection

SQL Injection Concepts, Types of SQL Injection, SQL Injection Methodology, SQL Injection Tools, Evasion Techniques, SQL Injection Countermeasures

Wireless Network Hacking

Wireless Concepts, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Wireless Hacking Tools, Bluetooth Hacking, Wireless Countermeasures, Wireless Security Tools

Hacking Mobile Platforms

Mobile Platform Attack Vectors, Hacking Android OS, Hacking iOS, Mobile Device Management, Mobile Security Guidelines and Tools

IoT and OT Hacking

IoT Concepts, IoT Attacks, IoT Hacking Methodology, IoT Hacking Tools, IoT Countermeasures, OT Concepts, OT Attacks, OT Hacking Methodology, OT Hacking Tools, OT Countermeasures

Cloud Computing

Cloud Computing Concepts, Container Technology, Serverless Computing, Cloud Computing Threats, Cloud Hacking, Cloud Security

Cryptography

Cryptography Concepts, Encryption Algorithms, Cryptography Tools, Public Key Infrastructure (PKI), Email Encryption, Disk Encryption, Cryptanalysis, Countermeasures

Upcoming Batches

23 July 2022 - Weekend Batch

25 July 2022 - Weekday Batch

Have Queries?

Call us for any query regarding course, syllabus, fee structure or anything related to cyber security training.