• Classroom Training   • Online Training   • Corporate Training  • Live Projects & Guidance 

Cyber Security

Courses Information

Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.

You will learn to practice cybersecurity skills in real world scenarios

Curriculum
Module 1 - Introduction to Penetration Testing & Methodologies
  • Overview of Penetration Testing
  • Types of Penetration Testing
  • Penetration Testing Methodologies
  • Penetration Testing Strategies
  • Ethics of a Penetration Tester
Module 2 – Penetration Testing Scoping & Engagement Methodology
  • Penetration Testing: Pre-engagement Activities
  • Request for Proposal (RFP)
  • Setting the Rules of Engagement (ROE)
  • Identify the Details of the Key Contact
  • Handling Legal Issues in Penetration Testing Engagement
  • Preparing for Test
  • Handling Scope Creeping during Pen Test
  • Penetration Testing: Pre-engagement Activities
Module 3 – Open-Source Intelligence (OSINT) Methodologies
  • Learn various Skills & Techniques to gather intelligence about the Target
  • OSINT through Website Analysis
  • OSINT through DNS Interrogation
  • Automating your OSINT Effort using Tools/Framework/Scripts
Module 4 – Social Engineering Penetration Testing Methodology
  • Penetration Testing Methodology for assessing human behaviours
  • Social Engineering Penetration Testing using E-mail Attack Vector
  • Social Engineering Penetration Testing using Physical Attack Vector
Module 5 – Network Penetration Testing Methodology – External
  • Overview of Network Penetration Testing
  • OS & Service Fingerprinting
  • Exploit Verification
  • Network Security Countermeasures
  • Accessing of instances private subnet
Module 6 – Network Penetration Testing Methodology – Internal
  • Overview of Internal Network Penetration Testing
  • Identify the Internal Domains/ IP Range
  • Scanning the Network
  • Enumeration
  • Sniffing
Module 7 – Network Penetration Testing Methodology – Perimeter Devices
  • Firewall Penetration Testing Steps
  • Ids Penetration Testing
  • Router Penetration Testing
  • Switch Penetration Testing
  • Assessing Security of Routers
  • Countermeasures & Recommendations
Module 8 – Web Application Penetration Testing Methodology
  • Overview of Web Application Penetration Testing
  • Web Application Penetration Testing Steps
  • Discover Web Application Default Content
  • Conducting Web Vulnerability Assessment
  • Test for SQL Injection Vulnerabilities
  • Test for Parameter Tampering
  • Test for Client –Side Attack
  • Web Application Security Countermeasures & Recommendations
Module 9 – Database Penetration Testing Methodology
  • Database Penetration Testing Steps
  • Information Reconnaissance
  • Database Enumeration
  • Database Exploitation
  • Countermeasures & Recommendations
Module 10 – Wireless Penetration Testing Methodology
  • Wireless Penetration Testing Methodology
  • WLAN Penetration Testing
  • RFID Penetration Testing
  • Mobile Device Penetration Testing
  • IoT Penetration Testing
  • Countermeasures & Recommendations
Module 11 – Cloud Penetration Testing Methodology
  • Cloud Computing Security & Concern
  • Cloud Specific Penetration Testing
  • Performing a Detailed Vulnerability Assessment
  • Recommendations for Cloud Testing
  • IoT Penetration Testing
  • Cloud Security Countermeasure
Module 12 – Report Writing & Post Testing Actions
  • Learn how to write Comprehensive Penetration Testing Report
  • Goal of the Penetration Testing Report
  • Examine Types of Pen Testing Reports
  • Review & Finalize the report
  • Examine Penetration Testing Report Analysis
  • Create Security Policies for Testing Reports

Trending Courses