Overview
Cyber security is one of significant aspects in the realm of Information Technology (IT) industries around the world. The IT-based services have been dominating in almost all sphere of life including the way we live, the way we communicate, the way we do business etc. The sustainability and the effectiveness of the technology driven services cannot be ensured without robust implementation of a robust and secured network. The significance of cyber security is not only a demanding aspect in organizational level, but also a much-needed concern in individual level.
The Cyber Security Essentials course is designed to train and prepare you for the future IT World. This course will develop your theoretical knowledge and provide hands on experience on various tools VMware, Oracle VM VirtualBox, Kali Linux, Ubuntu etc. The lab exercises will provide a practical knowledge on vulnerability analysis of a system, intrusion detection, intrusion prevention, web exploitation, password attack etc.
Who can join?
-
- Bachelor’s degree from any discipline
- Basic computer knowledge such as how to operate a computer, installation of software, uses of internet in daily life and emails
- Intermediate knowledge of using Microsoft Office such as Word, Excel and Power Point
- Previous knowledge on IT and Linux operating system will be a bonus.
- Proficiency in English will be a huge plus
Prerequisite
A motivated person with Bachelor degree in any discipline who is seeking an IT professional job.
Learning outcomes
- To gain valuable pertaining to cyber security, importance and the needs of cyber security in the current world.
- To be able to investigate on the vulnerability of a system.
- To be one step closure to be a certified ethical hacker and pen tester.
- To be able to design a secure system for a given set of constraints.
Instruction method
Instructor-led live online
Course outline
Session 1: Introduction of Cyber Security and Malicious Software
- What is cyber security? The importance of cyber security.
- Aims of cyber security
- Concept of CIA
- Virus, Worm, Spyware, Trojan
- Group/ Individual work on different scenario
Session 2: The issues on Cyber Security
- Cyber Criminal
- Threats
- Vulnerability
- Attack Trees
- Risk Management
- Review question Practice on Malicious Software and different scenario
- Individual activity on attack trees using Microsoft Visio or draw.io
Session 3: Virtual Machines
- Introduction to VMs.
- Introduction to Kali Linux, Ubuntu etc.
- Installation of Kali Linux and Ubuntu.
Session 4: Cyber Attacks
- Application and Network based cyber attacks
- Server-side web application attacks
- Cross-site scripting (XSS)
- Denial of Service attacks
- Penetration testing
- Lab on web application attack using Kali Linux.
Session 5: Cryptography
- Symmetric and Asymmetric Encryption
- Terminologies related to cryptography
- Public and Private Key concept
- Encryption and Decryption
- Steganography
- Lab on steganography
- Lab based on TueCrypt software and Password attack.
Session 6: Basics of Network Security
- Standard Network Devices
- Network Security Hardware
- Firewalls
- Virtual Private Network
- Intrusion Detection System and Intrusion Prevention System
- DMZ
- Group activity on DMZ and Firewalls.
Session 7: Fundamentals of Hacking and Reconnaissance
- Types of Hacking and Defense
- Ethics of Hacking
- Active and Passive Reconnaissance
- OSINT framework for Cyber security data collection
- Port Scan and Network Scan
- Port Scanning tool with Nmap
Session 8: Lab on Reconnaissance and Exploitation
- Lab on Linux-based VM : Metasploitable
- Vulnerability Analysis
- Details activity with Nmap
- Useful discussion on Penetration testing and exploit on a target system.
Session 9: Password Cracking and Vulnerability Analysis
- Password Attack
- Hashing and Salting
- Password storing system
- Password Cracking and tools
- Wordlist
- Hands on experience with John the Ripper
Session 10: Web exploitation and Social Engineering
- Web Attacks/Exploitation
- SQL injection
- Introduction to various tools on web exploitation such as NIKTO
- Social Engineering Attacks
- Phishing
- Physical Security
Session 11: Web exploitation lab
- Cracking login credentials
- Command Injection
- SQL injection
- Cross-site scripting (XSS)
- Group activity on DMZ and Firewalls.
Reviews
There are no reviews yet.