Advanced Cyber Security Certification Training

24 hours of learning over 4 days. That is all it takes to become a cybersecurity expert and a professional that companies will want to hire
Duration: 4 Day
Hours: 24 Hours
Training Level: All Level
Virtual Class Id: 50077
Recorded
Single Attendee
$349.00 $583.00
6 month Access for Recorded
Have Any Queries

Call Us : +1-888-880-0589

support@virtualtrainings.com

About the Course:

Cyber Security is a very vast subject where we are covering one type of Cyber security here. i.e : Offensive Cyber Security which means Ethical Hacking. Ethical hacking is a very important issue in today's situation, helping individuals and organizations adopt secure practices and use IT infrastructure. This course starts with basic topics such as networking, network security, and encryption, and discusses various attacks and vulnerabilities and how to protect them. There are hands-on demonstrations that will be useful to the participants. Participants are encouraged to try and reproduce the demonstration experiments described as part of the course.

Course Objective:

The educational objectives of the program are:

  • To prepare students with the technical knowledge and skills needed to protect and defend computer systems and networks.
  • To develop graduates that can plan, implement, and monitor cyber security mechanisms to help ensure the protection of information technology assets.
  • To develop graduates that can identify, analyze, and remediate computer security breaches.

Who is the Target Audience?

Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical Engineering / Any one who wants to create the career in side Cyber Security

Basic Knowledge:

Basic concepts in programming and networking

Curriculum
Total Duration: 24 Hours
BASIC CONCEPTS IN PROGRAMMING AND NETWORKING

  • Introduction to Ethical Hacking  
  • Basic Concepts of Networking (part-l)  
  • Basic Concepts of Networking (part-l I)  
  • TCP/IP Protocol Stack (part-l)  
  • TCP/IP Protocol Stack (Part-lI)  
  • IP addressing and routing (Part I)  
  • IP addressing and routing (Part II)  
  • TCP and UDP (Part I)  
  • TCP and UDP (Part II)  
  • IP subnetting  
  • Routing protocols (Part I)  
  • Routing protocols (Part II)  
  • Routing protocols (Part III)  
  • IP version 6  
  • Routing examples  

CREATING LAB FOR SYSTEM HACKING

  • Demonstration Part I  
  • Demonstration Part II  
  • Demonstration Part III  
  • Nessus Installation  
  • How to use nessus  
  • Metasploit Exploiting System Software -1  
  • Metasploit Exploiting System Software - II  
  • Metasploit Exploiting System Software and Privilege  
  • Metasploit Social Eng Attack  
  • MITM (Man in The middle)Attack  
  • Basic concepts of cryptography  
  • Private-key cryptography (Part I)  
  • Private-key cryptography (Part II)  
  • Public-key cryptography (Part I)  
  • Public-key cryptography (Part II)  

DIFFERENT TYPES OF ATTACKS

  • Cryptographic hash functions (Part I)  
  • Cryptographic hash functions (Part II)  
  • Digital signature and certificate  
  • Applications (Part I)  
  • Applications (Part II)  
  • Steganography  
  • Biometrics  
  • Network Based Attacks (Part I)  
  • Network Based Attacks (Part II)  
  • DNS and Email Security  
  • Password cracking  
  • Phishing attack  
  • Malware  

DIFFERENT TYPES OF ATTACKS - ||

  • WIFI hacking  
  • Dos and DDos attack  
  • Elements of Hardware Security  
  • Side Channel Attacks (Part I)  
  • Side Channel Attacks (Part II)  
  • Physical Unclonable Function  
  • Hardware Trojan  
  • Web Application Vulnerability Scanning  
  • Part 1 : SQL Injection Authentication Bypass  
  • Part 2: SQL Injection Error Based  
  • Part 3 : SQL Injection Error Based from Web Application  
  • SQLMAP  
  • Cross Site Scripting  
  • File Upload Vulnerability  
  • The NMAP Tool: A Relook (Part I)  
  • The NMAP Tool: A Relook (Part II)  
  • The NMAP Tool: A Relook (Part III)  
  • Network Analysis using Wireshark  
  • Summarization of the Course  
  • Doubt Session