aroushtech.in

Course Details

Home - Course Details

LINUX FUNDAMENTALS + ADVANCED CYBER SECURITY TRAINING

Description

COURSE OUTLINE

1. Linux Introduction
• Distributions
• Linux kernel
• Installing and removing – With LAB
• Apt, yum, Git Explained
• The Linux Command Line – With LAB
• Shell Scripting Basics – With LAB
• User Management
• User Profiles

2. Introduction to Cyber Security
• Introduction to Machines
• Cyber Security vs Information security
• Fundamentals of Cyber Security
• Hacking Concepts
• Laws and Standards
• Cyber Kill Chain
• Security Controls

3. Footprinting And Reconnaissance
• Footprinting Concepts
• Website Footprinting – With LAB
• DNS Footprinting – With LAB
• Email Footprinting – With LAB
• Network Footprinting – With LAB
• Footprinting through search engines – With LAB

• Web services
• Footprinting through Socialmedia – With LAB
• Footprinting Counter Measures

4. Scanning Networks
• Concepts of Scanning Network
• Scanning tools – With LAB
• Port and Services – With LAB
• Banner grabbing/OS Fingerprinting – With LAB
• Bypassing IDS and Firewall – With LAB
• Draw network Diagram – With LAB

5. Enumeration
• Enumeration Concepts
• NetBIOS Enumerations – With LAB
• SNMP Enumeration – With LAB
• LDAP Enumeration – With LAB
• NTP and NFS Enumeration – With LAB
• SMTP and DNS Enumeration – With LAB
• Other Enumeration Technique – With LAB
• Enumeration Countermeasures

6. Vulnerability Analysis
• Vulnerability Assessment Concepts
• Vulnerability Classification and Assessment Types
• Vulnerability Assessments Solution and Tool – With LAB
• Vulnerability Assessment Report – With LAB

7. System Hacking
• System Hacking Concepts
• Gaining Access – With LAB
• Escalating Privileges – With LAB
• Maintaining Access – With LAB
• Clearing Logs – With LAB

8. Malware Threats
• Malware Concepts
• APT Concepts – With LAB
• Trojan Concepts – With LAB
• Virus And Worms Concepts – With LAB
• Fileless Malware Concepts – With LAB
• Malware Analysis – With LAB
• Countermeasures
• Anti-Malware Software

9. Sniffing
• Sniffing Concepts
• MAC attacks – With LAB
• DHCP Attacks – With LAB
• ARP Poisoning – With LAB
• Spoofing Attacks – With LAB
• DNS Poisoning – With LAB
• Sniffing Tools – With LAB
• Countermeasures
• Sniffing Detection Techniques

10. Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques – With LAB
• Insider Threats
• Impersonations on social Networking Sites
• Identity Theft
• Countermeasures

11. Denial-of-Service
• DoS/DDoS Concepts
• DoS/DDoS Techniques – With LAB
• Botnets – With LAB
• DDOS Case Study
• DoS/DDos Attack Tools – With LAB
• Countermeasures
• Dos/DDoS protection Tools

12. Session Hijacking
• Session hijacking Concepts
• Application Level Session hijacking – With LAB
• Network Level Session hijacking – With LAB
• Session Hijacking Tools – With LAB
• Countermeasures

13. Evading IDS,Firewalls and Honeypots
• IDS,IPS,Firewall and Honeypot Concepts
• IDS,IPS,Firewall and Honeypot Solutions
• Evading IDS – With LAB
• Evading Firewalls – With LAB
• IDS/Firewalls Evading Tools – With LAB

• IDS/Firewalls Evading Tools – With LAB
• Countermeasures

14. Hacking Web Servers
• Web Server Concepts
• Web Server Attacks – With LAB
• Web Server Attack Methodology – With LAB
• Web Server Attack Tools – With LAB
• Countermeasures
• Patch Management
• Web Server Security Tools – With LAB

15. Hacking Web Applications (BASIC)
• Web Applications Concepts
• Web Applications Threats – With LAB
• Web Applications Hacking Methodology
• Web API, Web hooks and Web Shells – With LAB
• Web Applications Security

16. SQL Injections
• SQL injections Concepts
• Types of SQL Injection – With LAB
• SQL Injection Methodology – With LAB
• SQL Injection Tools – With LAB
• Evasion Techniques – With LAB
• Countermeasures

17. Hacking Wireless Networks
• Wireless Concepts
• Wireless Encryption – With LAB
• Wireless Threats – With LAB
• Wireless Hacking Methodology
• Wireless Hacking Tools – With LAB
• Bluetooth Hacking – With LAB
• Countermeasures
• Wireless Security Tools – With LAB

18. Hacking Mobile Platforms
• Mobile Platform Attack Vectors
• Hacking Android OS
• Hacking IOS – With LAB
• Mobile Device Management – With LAB
• Mobile Security Guidelines and Tools

19. IoT and OT Hacking
• IoT Concepts
• IoT Attacks – With LAB
• IoT Hacking Methodology
• IoT hacking Tools – With LAB
• Countermeasures
• OT Concepts
• OT Attacks – With LAB
• OT Hacking Methodology
• OT Hacking Tools – With LAB
• Countermeasures

20. Cloud Computing
• Cloud Computing Concepts
• Container Technology
• Serverless Computing
• Cloud Computing Threats
• Cloud hacking – With LAB
• Cloud Security

21. Cryptography
• Cryptography Concepts
• Encryption Algorithms
• Cryptography Tools – With LAB
• Public Key Infrastructure (PKI)
• EMAIL Encryption – With LAB
• Disk Encryption
• Cryptanalysis – With LAB
• Countermeasures

Zac Livingston

Am if number no up period regard sudden better. Decisively surrounded all admiration and not you. Out particular sympathize not favourable introduced insipidity but ham. Rather number can and set praise. Distrusts an it contented perceived attending oh. Thoroughly estimating.

Course Details:

Course Price:

₹ 19,000

Instructor

Zac Livingston

Lesson Duration

12 Weeks

Language:

English, Hindi

Certifications

Scroll to Top