Cyber security (IT)
Advanced Executive Program In Cybersecurity
Be at the forefront of a cyber-resilient future
Become an industry-ready professional with Advanced Executive Program in Cybersecurity and transform your career in 6 months. This course provides a high-engagement learning experience with real-world applications and is designed for individuals who want to start a new, more fulfilling career.
1Module 1: "Introduction To Cryptography"
- Welcome The information Security Field InfoSec Culture Career Opportunities Information Security Terms Cryptography and VPNs Wireshark Introduction Binary Arithmetic Basics Bitwise Operations Hexadecimal Arithmetic
2Module 2: "Networking"
- Protocols
- IP
- Routing
- Link Layer Devices and Protocols
- TCP and UDP
- Firewalls and Network Defenses
- DNS
- Wireshark
3Module 3: "Web Applications
- Introduction
- HTTP Protocol Basics
- HTTP Cookies
- Sessions
- Same Origin Policy
- Burp Suite
4Module 4: "Penetration Testing"
- Introduction
- Lifecycle of Penetration Test
- Engagement
- Information Gathering
- Foot printing and Scanning
- Vulnerability Assessment
- Exploitation
- Reporting
5Module 5: "Introduction to Programming"
- What is programming
- Low and high-level languages
- Programming vs. Scripting
- Basic conce
- Functions
- Conditional Statements
- Loops
- Understanding the Code
- Conclusion
6Module 6: "Python"
- What is python
- Variables and types
- Input / Output
- Control flow
- Lists
- Dictionaries
- Functions
- Modules
- Scripting for pen testers
- Network sockets
- Port scanning
- Backdoor
- HTTP
- Login brute forcing
- Python assisted hacking
7Module 7: "Command Line Scripting"
- Bash shell
- Bash environment
- Bash commands and programs
- Bash output redirectors and special characters
- Bash conditional statements and loops
- Windows command line
- Windows environment
- Windows commands and programs
- Windows output redirectors and special characters
- Windows conditional statements and loops
8Module 8: "PENETRATION TESTING"
- Information gathering
- Introduction
- Open-source Intelligence
- Subdomain enumeration
- Importance of information gathering
9Module 9: "Footprinting and scanning"
- Mapping network
- OS fingerprinting
- Port Scanning
10Module 10: "Vulnerability Assessment"
- Vulnerability assessment
- Nessus
11Module 11: "Web Application Attacks"
- Introduction
- HTTP/S Protocol Basics
- Web server fingerprinting
- HTTP Verbs
- Directories and file enumeration
- Google Hacking
- Cross Site Scripting (XSS)
- SQL Injections
- Encoding
- Web application proxies
- Other common web attacks
- File and resource attacks
12Module 12: "System Attacks"
- Malware
- Viruses
- Trojan Horses
- Backdoors
- Rootkits
- Bootkits
- Adware
- Spyware
- Greyware
- Dialer
- Keylogger
- Bots
- Ransomware
- Data-stealing malware
- Worms
13Module 13: "Password attacks"
- Brute force algorithm
- Brute forcing weaknesses
- John the Ripper
- Dictionary attacks
- Hashcat
- Conclusion
14Module 14: "Buffer Overflow Attacks"
- Buffers
- Stack
- The stack in applications
- How buffer overflow attacks work
15Module 15: "Network Attacks"
- Authenticating Cracking
- Brute force vs. Dictionary Attacks
- Weak and default credentials
- Authentication cracking tools
- Hydra
16Module 16: "Windows shares"
- NetBIOS
- Shares
- UNC Paths
- Administrative shares
- Badly configured shares
17Module 17: "Null Sessions"
- Enumerating windows shares
- Checking for Null Sessions
- Exploiting Null sessions
- About null sessions
18Module 18: "ARP Poisoning"
- ARP poisoning actors
- Gratuitous ARP replies
- Forwarding and mangling packets
- Local to remote Man in the Middle
- DsniffArpspoof
19Module 19: "Metasploit"
- MSFConsole
- Identifying a vulnerable service
- Searching
- Configuring an exploit
- Configuring a payload
- Running an exploit
20Module 20: "Meterpreter"
- Bind and reverse
- Launching meterpreter
- Sessions
- Information gathering with meterpreter
- Privilege escalation
- Dumping the password database
- Exploring the victim system
- Uploading and downloading files
- Running OS Shell
- Beyond Remote Code Execution
21Module 21: "Forensic Investigation"
- Computer Forensics Today
- Computer Forensics Investigation Process
- Hard Disks & File Systems
- Data Acquisition
- Anti-Forensics Techniques
- Operating System Forensics
- Network Forensics
- Web Attack Investigation
- Database Forensics
- Forensics with the Cloud
- Malware
- Email Investigation
- Mobile
- Forensic Reporting
- Course Summary
Benefits of learning Cyber security (IT) at Solve Tech Training Institute
- Our experienced professionals are instructing this course.
- Solve Tech provides you the facility to schedule the classes according to your availability.
- Following each session, you'll receive the course material for your own future reference.
- You will receive an internationally recognised certification after completing the course.