Course Details
Home - Course Details
LINUX FUNDAMENTALS + ADVANCED CYBER SECURITY TRAINING
Description
COURSE OUTLINE
1. Linux Introduction
• Distributions
• Linux kernel
• Installing and removing – With LAB
• Apt, yum, Git Explained
• The Linux Command Line – With LAB
• Shell Scripting Basics – With LAB
• User Management
• User Profiles
2. Introduction to Cyber Security
• Introduction to Machines
• Cyber Security vs Information security
• Fundamentals of Cyber Security
• Hacking Concepts
• Laws and Standards
• Cyber Kill Chain
• Security Controls
3. Footprinting And Reconnaissance
• Footprinting Concepts
• Website Footprinting – With LAB
• DNS Footprinting – With LAB
• Email Footprinting – With LAB
• Network Footprinting – With LAB
• Footprinting through search engines – With LAB
• Web services
• Footprinting through Socialmedia – With LAB
• Footprinting Counter Measures
4. Scanning Networks
• Concepts of Scanning Network
• Scanning tools – With LAB
• Port and Services – With LAB
• Banner grabbing/OS Fingerprinting – With LAB
• Bypassing IDS and Firewall – With LAB
• Draw network Diagram – With LAB
5. Enumeration
• Enumeration Concepts
• NetBIOS Enumerations – With LAB
• SNMP Enumeration – With LAB
• LDAP Enumeration – With LAB
• NTP and NFS Enumeration – With LAB
• SMTP and DNS Enumeration – With LAB
• Other Enumeration Technique – With LAB
• Enumeration Countermeasures
6. Vulnerability Analysis
• Vulnerability Assessment Concepts
• Vulnerability Classification and Assessment Types
• Vulnerability Assessments Solution and Tool – With LAB
• Vulnerability Assessment Report – With LAB
7. System Hacking
• System Hacking Concepts
• Gaining Access – With LAB
• Escalating Privileges – With LAB
• Maintaining Access – With LAB
• Clearing Logs – With LAB
8. Malware Threats
• Malware Concepts
• APT Concepts – With LAB
• Trojan Concepts – With LAB
• Virus And Worms Concepts – With LAB
• Fileless Malware Concepts – With LAB
• Malware Analysis – With LAB
• Countermeasures
• Anti-Malware Software
9. Sniffing
• Sniffing Concepts
• MAC attacks – With LAB
• DHCP Attacks – With LAB
• ARP Poisoning – With LAB
• Spoofing Attacks – With LAB
• DNS Poisoning – With LAB
• Sniffing Tools – With LAB
• Countermeasures
• Sniffing Detection Techniques
10. Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques – With LAB
• Insider Threats
• Impersonations on social Networking Sites
• Identity Theft
• Countermeasures
11. Denial-of-Service
• DoS/DDoS Concepts
• DoS/DDoS Techniques – With LAB
• Botnets – With LAB
• DDOS Case Study
• DoS/DDos Attack Tools – With LAB
• Countermeasures
• Dos/DDoS protection Tools
12. Session Hijacking
• Session hijacking Concepts
• Application Level Session hijacking – With LAB
• Network Level Session hijacking – With LAB
• Session Hijacking Tools – With LAB
• Countermeasures
13. Evading IDS,Firewalls and Honeypots
• IDS,IPS,Firewall and Honeypot Concepts
• IDS,IPS,Firewall and Honeypot Solutions
• Evading IDS – With LAB
• Evading Firewalls – With LAB
• IDS/Firewalls Evading Tools – With LAB
• IDS/Firewalls Evading Tools – With LAB
• Countermeasures
14. Hacking Web Servers
• Web Server Concepts
• Web Server Attacks – With LAB
• Web Server Attack Methodology – With LAB
• Web Server Attack Tools – With LAB
• Countermeasures
• Patch Management
• Web Server Security Tools – With LAB
15. Hacking Web Applications (BASIC)
• Web Applications Concepts
• Web Applications Threats – With LAB
• Web Applications Hacking Methodology
• Web API, Web hooks and Web Shells – With LAB
• Web Applications Security
16. SQL Injections
• SQL injections Concepts
• Types of SQL Injection – With LAB
• SQL Injection Methodology – With LAB
• SQL Injection Tools – With LAB
• Evasion Techniques – With LAB
• Countermeasures
17. Hacking Wireless Networks
• Wireless Concepts
• Wireless Encryption – With LAB
• Wireless Threats – With LAB
• Wireless Hacking Methodology
• Wireless Hacking Tools – With LAB
• Bluetooth Hacking – With LAB
• Countermeasures
• Wireless Security Tools – With LAB
18. Hacking Mobile Platforms
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking IOS – With LAB
• Mobile Device Management – With LAB
• Mobile Security Guidelines and Tools
19. IoT and OT Hacking
• IoT Concepts
• IoT Attacks – With LAB
• IoT Hacking Methodology
• IoT hacking Tools – With LAB
• Countermeasures
• OT Concepts
• OT Attacks – With LAB
• OT Hacking Methodology
• OT Hacking Tools – With LAB
• Countermeasures
20. Cloud Computing
• Cloud Computing Concepts
• Container Technology
• Serverless Computing
• Cloud Computing Threats
• Cloud hacking – With LAB
• Cloud Security
21. Cryptography
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools – With LAB
• Public Key Infrastructure (PKI)
• EMAIL Encryption – With LAB
• Disk Encryption
• Cryptanalysis – With LAB
• Countermeasures

Zac Livingston
Am if number no up period regard sudden better. Decisively surrounded all admiration and not you. Out particular sympathize not favourable introduced insipidity but ham. Rather number can and set praise. Distrusts an it contented perceived attending oh. Thoroughly estimating.

Course Details:
Course Price:
₹ 19,000
Instructor
Zac Livingston
Lesson Duration
12 Weeks
Language:
English, Hindi