Curriculum

15 Topics
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Footprinting
Objectives of Footprinting
Types of Footprinting
Footprinting Techniques

7 Topics
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Hash functions
Digital signatures
Public Key Infrastructure (PKI)
Attacks on cryptosystems

8 Topics
Introduction to Computer Network
Computer Networks - Architecture
Layered architecture
Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Network Scanning
Enumeration
Common Network Threats/Attacks

5 Topics
Web server architecture
Web server attacks
Countermeasures and patch management
Web application architecture
Web application attacks

7 Topics
Authentication and authorization
Authentication and authorization principles
Regulation of access
Access administration
IdAM
Password protection
Identity theft

12 Topics
Vulnerability Analysis
Types of Vulnerability Analysis
Vulnerability Assessment Lifecycle
Vulnerability Assessment Tools
Vulnerability Scoring Systems
Vulnerability Assessments Report
System Hacking
Password Cracking
Privilege escalation
Executing Applications
Hiding Files
Clearing Logs

9 Topics
Malware and its propagation ways
Malware components
Types of malware
Concept of sniffing
Types of sniffing
Types of sniffing attacks
SQL injection
Types of SQL injection
SQL injection Methodologies

14 Topics
DoS attack
DDoS attack
Common symptoms of DoS/DDoS attack
Categories of DoS/DDoS Attack Vectors
DoS/DDoS detection techniques
Session hijacking
Application level session hijacking
Network level session hijacking
Intrusion Detection System (IDS)
Types of Intrusion Detection Systems
Introduction to Firewalls
Types of Firewalls
Introduction to Honeypots
Evading IDS

  Write a Review

Cybersecurity Certification Course

Go to Paid Course