Courses Offered: SCJP SCWCD Design patterns EJB CORE JAVA AJAX Adv. Java XML STRUTS Web services SPRING HIBERNATE  

       

Cyber Security Course Details
 

Subcribe and Access : 5200+ FREE Videos and 21+ Subjects Like CRT, SoftSkills, JAVA, Hadoop, Microsoft .NET, Testing Tools etc..

Batch Date: Feb 25th @7:00PM

Faculty: Mr. Shoaib Ahmed

Duration: 45 Days

Venue :
DURGA SOFTWARE SOLUTIONS,
Flat No : 202, 2nd Floor,
HUDA Maitrivanam,
Ameerpet, Hyderabad - 500038

Ph.No: +91 - 8885252627, 9246212143, 80 96 96 96 96

Syllabus:

Cyber Security
with Certified Ethical Hacking V13 with AI

Module 01: Prerequisites for Ethical Hacking

  • Introduction to Ethical Hacking and Cyber Kill Chain
  • Networking Fundamentals:
    • IP addresses and their categories
    • Networking Protocols – DNS, DHCP, Telnet, SSH, FTP
    • Assigning IP addresses
    • MAC Address
  • Lab Setup Installation – Installing and Managing Virtual Machines
  • Linux 101 – Understanding the Linux Architecture and Commands
  • Spoofing of IP and MAC Addresses

Module 02: Footprinting and Reconnaissance

  • What is Footprinting?
    • Techniques of WHOIS, DNS, Email Footprinting
  • Demonstrate Footprinting through
    • Search Engines
    • Internet Research Sites
    • Google Hacking Database and much more
    • Using Advanced Kali based tools for Footprinting
    • Making Footprinting easier with AI

Module 03: Scanning Networks

  • Ports and their categories
  • Network Scanning using NMAP and other tools.
  • Port Scanning
  • Countermeasures for various scanning techniques

Module 04: Enumeration

  • Service Enumeration such as
    • DNS Enumeration
    • NetBIOS Enumeration
    • SMB Enumeration
    • SMTP Enumeration and much more
  • OS Enumeration
  • Enumeration Countermeasures

Module 05: System Hacking

  • What are password hashes?
  • Password Cracking using Dictionary and Brute-force Attacks
  • Password Bypassing
  • Steganography and it’s use cases

Module 06: Malware Threats

  • What are Malwares
  • How to create Malwares such as:
    • Viruses
    • Worms
    • Trojans
    • Spywares
  • Detecting Malwares and Defending against them

Module 07: Sniffing

  • Packet Sniffing using Wireshark
  • Man-in-the-middle Attacks
  • Countermeasures against sniffing attacks

Module 08: DOS and DDOS Attacks

  • What are DOS Attacks?
  • What are DDOS Attacks?
  • Tools to perform DOS and DDOS Attacks
  • Countermeasures to mitigate DoS/DDoS attacks

Module 09: Social Engineering

  • What is Phishing?
  • Stealing credentials from replicated login pages
  • Countermeasures against social engineering

Module 10: Vulnerability Analysis

  • Vulnerability scanning using Nessus
  • Generating Vulnerability scanning Reports
  • Performing Vulnerability Assessment using Metasploit Framework
  • Analysing CVEs and risk mitigation strategies

Module 11: Evading IDS, Firewalls, and Honeypots

  • What are Firewalls
  • What is IDS and IPS
  • Snort IDS/IPS
  • What are honeypots
  • Evading techniques and mitigations

Module 12: Hacking Web Servers

  • Scanning web servers
  • Exploiting vulnerabilities on backend services
  • Gaining remote connection through vulnerable services
  • Countermeasures and mitigations for web server attacks

Module 13: Hacking Web Applications

  • HTTP Requests and Responses
  • Intro to OWASP Top 10 Framework
  • Using Burp Suite to intercept requests and find vulnerabilities
  • Learning Web application attacks such as:
    • SQL Injections
    • Cross Site Scripting
    • File Upload Vulnerability
    • Broken Authentication and Session Hijacking

Module 14: Hacking Wireless Networks

  • Basics of wireless standards, encryption protocols
  • Hacking wireless networks: WEP cracking, WPA/WPA2 attacks
  • Tools for wireless network penetration testing (e.g., Aircrack-ng, Reaver)
  • Countermeasures for securing wireless networks

Module 15: Hacking Mobile Platforms

  • Android Safety Measures
  • Android Hacking Using Rats
  • Detection of Malicious Apps
  • Android and IPhone Password Bypassing Tools

Module 16: Cryptography

  • Basics of Cryptography and Encryption Types
  • Symmetric and Asymmetric Encryptions
  • Difference between Encryption and Encoding

Module 17: IoT Hacking

  • What is Internet of Things
  • Tools used for IoT Hacking
  • Countermeasures

Module 18: Cloud Computing

  • Cloud Security Risks and Best Practices
  • Cloud Penetration Testing Methods
  • Vulnerability Assessment for Cloud Infrastructure
  • Securing Cloud Environments

Module 19: Bonus Module

  • Intro to Security Operations Center
  • What is Splunk
  • Reverse Engineering and Malware Analysis Resources
  • CTF Challenge to Assess and Review Key Concepts