Course Details
Home - Course Details
LINUX FUNDAMENTALS + ADVANCED CYBER SECURITY TRAINING
Description
COURSE OUTLINE
1. Linux Introduction
• Distributions
• Linux kernel
• Installing and removing – With LAB
• Apt, yum, Git Explained
• The Linux Command Line – With LAB
• Shell Scripting Basics – With LAB
• User Management
• User Profiles
2. Introduction to Cyber Security
• Introduction to Machines
• Cyber Security vs Information security
• Fundamentals of Cyber Security
• Hacking Concepts
• Laws and Standards
• Cyber Kill Chain
• Security Controls
3. Footprinting And Reconnaissance
• Footprinting Concepts
• Website Footprinting – With LAB
• DNS Footprinting – With LAB
• Email Footprinting – With LAB
• Network Footprinting – With LAB
• Footprinting through search engines – With LAB
• Web services
• Footprinting through Socialmedia – With LAB
• Footprinting Counter Measures
4. Scanning Networks
• Concepts of Scanning Network
• Scanning tools – With LAB
• Port and Services – With LAB
• Banner grabbing/OS Fingerprinting – With LAB
• Bypassing IDS and Firewall – With LAB
• Draw network Diagram – With LAB
5. Enumeration
• Enumeration Concepts
• NetBIOS Enumerations – With LAB
• SNMP Enumeration – With LAB
• LDAP Enumeration – With LAB
• NTP and NFS Enumeration – With LAB
• SMTP and DNS Enumeration – With LAB
• Other Enumeration Technique – With LAB
• Enumeration Countermeasures
6. Vulnerability Analysis
• Vulnerability Assessment Concepts
• Vulnerability Classification and Assessment Types
• Vulnerability Assessments Solution and Tool – With LAB
• Vulnerability Assessment Report – With LAB
7. System Hacking
• System Hacking Concepts
• Gaining Access – With LAB
• Escalating Privileges – With LAB
• Maintaining Access – With LAB
• Clearing Logs – With LAB
8. Malware Threats
• Malware Concepts
• APT Concepts – With LAB
• Trojan Concepts – With LAB
• Virus And Worms Concepts – With LAB
• Fileless Malware Concepts – With LAB
• Malware Analysis – With LAB
• Countermeasures
• Anti-Malware Software
9. Sniffing
• Sniffing Concepts
• MAC attacks – With LAB
• DHCP Attacks – With LAB
• ARP Poisoning – With LAB
• Spoofing Attacks – With LAB
• DNS Poisoning – With LAB
• Sniffing Tools – With LAB
• Countermeasures
• Sniffing Detection Techniques
10. Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques – With LAB
• Insider Threats
• Impersonations on social Networking Sites
• Identity Theft
• Countermeasures
11. Denial-of-Service
• DoS/DDoS Concepts
• DoS/DDoS Techniques – With LAB
• Botnets – With LAB
• DDOS Case Study
• DoS/DDos Attack Tools – With LAB
• Countermeasures
• Dos/DDoS protection Tools
12. Session Hijacking
• Session hijacking Concepts
• Application Level Session hijacking – With LAB
• Network Level Session hijacking – With LAB
• Session Hijacking Tools – With LAB
• Countermeasures
13. Evading IDS,Firewalls and Honeypots
• IDS,IPS,Firewall and Honeypot Concepts
• IDS,IPS,Firewall and Honeypot Solutions
• Evading IDS – With LAB
• Evading Firewalls – With LAB
• IDS/Firewalls Evading Tools – With LAB
• IDS/Firewalls Evading Tools – With LAB
• Countermeasures
14. Hacking Web Servers
• Web Server Concepts
• Web Server Attacks – With LAB
• Web Server Attack Methodology – With LAB
• Web Server Attack Tools – With LAB
• Countermeasures
• Patch Management
• Web Server Security Tools – With LAB
15. Hacking Web Applications (BASIC)
• Web Applications Concepts
• Web Applications Threats – With LAB
• Web Applications Hacking Methodology
• Web API, Web hooks and Web Shells – With LAB
• Web Applications Security
16. SQL Injections
• SQL injections Concepts
• Types of SQL Injection – With LAB
• SQL Injection Methodology – With LAB
• SQL Injection Tools – With LAB
• Evasion Techniques – With LAB
• Countermeasures
17. Hacking Wireless Networks
• Wireless Concepts
• Wireless Encryption – With LAB
• Wireless Threats – With LAB
• Wireless Hacking Methodology
• Wireless Hacking Tools – With LAB
• Bluetooth Hacking – With LAB
• Countermeasures
• Wireless Security Tools – With LAB
18. Hacking Mobile Platforms
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking IOS – With LAB
• Mobile Device Management – With LAB
• Mobile Security Guidelines and Tools
19. IoT and OT Hacking
• IoT Concepts
• IoT Attacks – With LAB
• IoT Hacking Methodology
• IoT hacking Tools – With LAB
• Countermeasures
• OT Concepts
• OT Attacks – With LAB
• OT Hacking Methodology
• OT Hacking Tools – With LAB
• Countermeasures
20. Cloud Computing
• Cloud Computing Concepts
• Container Technology
• Serverless Computing
• Cloud Computing Threats
• Cloud hacking – With LAB
• Cloud Security
21. Cryptography
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools – With LAB
• Public Key Infrastructure (PKI)
• EMAIL Encryption – With LAB
• Disk Encryption
• Cryptanalysis – With LAB
• Countermeasures

Mr. Tajuddin
Vertical Head Network Security/Cyber Security & Cloud Computing. MCA (Master of Computer Application) 20+ years of exp in IT Industry