Introduction:

Today technology has become more complex and it is integrated into our social and work lives, the need for security is rapidly gaining significance where confidential information and critical infrastructure face risks of being hacked. Malware, social engineering, infrastructure destruction, system and application exploits are threatening individuals and corporations daily. If these threats are not mitigated, there would be disastrous consequences.

A serious risk is that an online criminal might exploit any poor network at home which may let the intruder or the hacker listens to network traffics in order to steal sensitive information such as usernames, passwords, emails, browsing history, etc. or launch malicious attacks.

Objectives:

Cyber Security course aims to teach students essential technical skills to secure computer and network resources and to handle cyber range exercises. Students will also learn how to apply the principles and practices of ethical hacking.

Outlines:

Introduction to Cyber Security Fundamentals

- Current threats and risks.

- Ethical hacking scope.

- Hackers types.

- Hacking examples.

- Hacking phases.

- Hacking terms.

Networking Fundamentals

- TCP and OSI models.

- Network protocols.

- IP addressing.

- Network devices.

- Network services.

Network Security

- Network security devices.

- Firewall types.

- IDS.

- IPS.

- Network Hacking.

Linux Fundamentals

- Linux distributions.

- Linux installation.

- Linux tools and commands.

- Linux file system.

- Linux program management.

- Linux user management.

Operating System Security

- Internal firewall.

- E-mail security.

- Authentication.

- Permissions.

- Encryption.

Windows Security

- Privilege and permission.

- File system.

- File and disk encryption.

- Windows update.

- Windows security assessment.

- Ports and services.

Windows Server

- Install windows server.

- Install DHCP.

- Install WSUS.

- Backup.

Windows Server Active Directory

- Install active directory.

- Install DNS.

- Configure active directory.

- Configure DNS.

- Configure GPOs.

Ethical Hacking

- Reconnaissance.

- Network Scanning.

- System Hacking.

- Malware Creation.

- Web Hacking.

- Mobile Hacking.

Penetration Testing and Vulnerability Scanning

- Install Open-Vas.

- Vulnerability scanning.

- CVEs.

- Exploit vulnerabilities.

- Bypass windows firewall.

Social Engineering

- Social engineering types.

- Social engineering phases.

- Social engineering scenarios.

=== Course Duration ===

  • 30 Hours (practical)

=== Training Registration ===

  • To register for this course, please fill the Registration Form or send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.