Cyber Security Training

Cyber Security Training
(Duration: 1 Month)

Course Overview

While empowering the next-generation enterprises, telcos and operators need to safeguard their critical infrastructure and their customers from external cyber threats that are exponentially growing everyday.

The Biggest threats to the world following land, sea, air, and space is Cyber. The biggest threat within the Cyber front are Cyber Terrorism, Cyber Warfare and Cyber Espionage. With cyber threats in a state of rapid and continuous evolution, keeping pace in cyber security strategy and operations is a major challenge to governments and private enterprise as well, given the threat to intellectual property and privately-held critical infrastructure. In their most disruptive form, cyber threats take aim at secret, political, military, or infrastructural assets of a nation, or its people.

ICT Cyber Training program is designed for the elite teams of technical security professionals who are part of the armed forces, Department of Defence, or other government agencies whose role includes securing systems, reconnaissance, counterterrorism and counter hacks.

Our values are embodied throughout everything we do, both within and outside of the office. We are a family, working together to help the world to be safe, secure and sophisticated.



Eligibility

Any Individual or Professional having basic knowledge on Computers can enroll for Cyber Training.


Opportunities

Cybersecurity is an in-demand field. Growing cyber attacks, demand for safe and secure data, and other concerns mean that companies need professionals to keep their information safe. There are lots of opportunities in government agencies and defense/aerospace firms, IT Companies and Financial Services Companies for cybersecurity professionals.


Syllabus

Introduction

Fundamentals of Cyber Security and Elements of Cyber Security, Role of Ethical Hacking in Cyber Security, Fundamentals of Hacking and Ethical hacking, Types of Hackers, Scope & Limitations of Ethical Hacking, Penetration Testing, Vulnerability Auditing, Phases of Hacking


Anonymization

Online Anonymity, Proxy server and working with Proxy Servers, VPN and Working with VPN, TOR network


Foot Printing, Scanning and Enumeration

Objectives of Foot Printing, Collecting Organization Details like Domain name, Sub domains, DNS Information, Servers Details, Email Ids, Network scanning, Objectives of network scanning, Enumeration, SNMP, SMPT, DNS Enumeration, Vulnerability Scanning


Password Hacking

Default passwords of network devices and software, Password guessing, Offline password cracking, Brute force cracking, Dictionary based cracking, Hybrid attack, Online password cracking, Man-in-the-middle attack, USB password stealers, What is a keylogger, Deploy a key logger to a remote pc, Defend against a Keylogger


Sniffers

Types of Sniffing, Promiscuous mode, ARP, ARP poison attack, Threats of ARP poison attack, MAC spoofing, MAC Flooding, CAM Table, Defend against MAC Spoofing attacks and Sniffers in network


Kali Linux Operating System

Kali Linux comparison with other Linux distributions, Uses of Kali Linux, Tools for Footprinting, Scanning & Sniffing, Metasploit framework, Metasploit framework to attack on Windows machines, Metasploit framework to attack on Linux Machine, Metasploit framework to attack on Android devices, Metasploit framework to attack using Software Vulnerabilities


Malwares

Malware, Types of malwares, creation of malware, virus, Worm and Spyware , Rootkit


Hacking Web Servers & Web Applications

Introduction to Web server, hacking of webservers & its consequences, Directory traversal attacks and Website password brute forcing , Defend against web server hacking


Session Hijacking

Session hijacking, Session hijacking techniques, Cross-Site scripting attack, Session hijacking tools, Defend against session hijacking


SQL Injection

SQL Injection and Effects of SQL Injection attacks, Types of SQL Injection attacks, SQL Injection detection tools


Phishing

What is Phishing, Host a Phishing website, Procedure to attract the victims to access Phishing websites, differentiate a Phishing webpage and original webpage, defend against Phishing attacks


Buffer Overflow

Buffer and usage of buffers in applications, buffer overflow and Sample buffer overflow attack, How to detect a buffer overflow and defend against buffer overflow attacks


Denial of Service

What is a DoS attack and DDoS attack, Symptoms of a Dos attack and techniques, Defending DoS attacks


Wireless Hacking

Types of wireless networks, Types of Wi-Fi authentications and encryptions (WEP, WPA and WPA2), Hardware and software required to crack Wi-Fi networks, Crack WEP, WPA and WPA2 encryption, Defend against Wi-Fi cracking attacks


Counter Measure Techniques for Network Level and Malware attacks

Types of Firewall and Limitations of a Firewall, IDS and IPS and Difference between IDS & IPS, UTM / Next-Generation Firewall and Configuring IPS module in UTM, Types of anti-malwares, Anti-Virus, Anti-Worm, Anti-Trojan, Anti-Rootkit and Internet Security Suites