Cyber Security (IT)

Cyber security (IT)

Advanced Executive Program In Cybersecurity

Be at the forefront of a cyber-resilient future

Become an industry-ready professional with Advanced Executive Program in Cybersecurity and transform your career in 6 months. This course provides a high-engagement learning experience with real-world applications and is designed for individuals who want to start a new, more fulfilling career.

Apply Now

1Module 1: "Introduction To Cryptography"
  • Welcome
  • The information Security Field InfoSec Culture Career Opportunities Information Security Terms Cryptography and VPNs Wireshark Introduction Binary Arithmetic Basics Bitwise Operations Hexadecimal Arithmetic
2Module 2: "Networking"
  • Protocols
  • IP
  • Routing
  • Link Layer Devices and Protocols
  • TCP and UDP
  • Firewalls and Network Defenses
  • DNS
  • Wireshark
3Module 3: "Web Applications
  • Introduction
  • HTTP Protocol Basics
  • HTTP Cookies
  • Sessions
  • Same Origin Policy
  • Burp Suite
4Module 4: "Penetration Testing"
  • Introduction
  • Lifecycle of Penetration Test
  • Engagement
  • Information Gathering
  • Foot printing and Scanning
  • Vulnerability Assessment
  • Exploitation
  • Reporting
5Module 5: "Introduction to Programming"
  • What is programming
  • Low and high-level languages
  • Programming vs. Scripting
  • Basic conce
  • Functions
  • Conditional Statements
  • Loops
  • Understanding the Code
  • Conclusion
6Module 6: "Python"
  • What is python
  • Variables and types
  • Input / Output
  • Control flow
  • Lists
  • Dictionaries
  • Functions
  • Modules
  • Scripting for pen testers
  • Network sockets
  • Port scanning
  • Backdoor
  • HTTP
  • Login brute forcing
  • Python assisted hacking
7Module 7: "Command Line Scripting"
  • Bash shell
  • Bash environment
  • Bash commands and programs
  • Bash output redirectors and special characters
  • Bash conditional statements and loops
  • Windows command line
  • Windows environment
  • Windows commands and programs
  • Windows output redirectors and special characters
  • Windows conditional statements and loops
8Module 8: "PENETRATION TESTING"
  • Information gathering
  • Introduction
  • Open-source Intelligence
  • Subdomain enumeration
  • Importance of information gathering
9Module 9: "Footprinting and scanning"
  • Mapping network
  • OS fingerprinting
  • Port Scanning
10Module 10: "Vulnerability Assessment"
  • Vulnerability assessment
  • Nessus
11Module 11: "Web Application Attacks"
  • Introduction
  • HTTP/S Protocol Basics
  • Web server fingerprinting
  • HTTP Verbs
  • Directories and file enumeration
  • Google Hacking
  • Cross Site Scripting (XSS)
  • SQL Injections
  • Encoding
  • Web application proxies
  • Other common web attacks
  • File and resource attacks
12Module 12: "System Attacks"
  • Malware
  • Viruses
  • Trojan Horses
  • Backdoors
  • Rootkits
  • Bootkits
  • Adware
  • Spyware
  • Greyware
  • Dialer
  • Keylogger
  • Bots
  • Ransomware
  • Data-stealing malware
  • Worms
13Module 13: "Password attacks"
  • Brute force algorithm
  • Brute forcing weaknesses
  • John the Ripper
  • Dictionary attacks
  • Hashcat
  • Conclusion
14Module 14: "Buffer Overflow Attacks"
  • Buffers
  • Stack
  • The stack in applications
  • How buffer overflow attacks work
15Module 15: "Network Attacks"
  • Authenticating Cracking
  • Brute force vs. Dictionary Attacks
  • Weak and default credentials
  • Authentication cracking tools
  • Hydra
16Module 16: "Windows shares"
  • NetBIOS
  • Shares
  • UNC Paths
  • Administrative shares
  • Badly configured shares
17Module 17: "Null Sessions"
  • Enumerating windows shares
  • Checking for Null Sessions
  • Exploiting Null sessions
  • About null sessions
18Module 18: "ARP Poisoning"
  • ARP poisoning actors
  • Gratuitous ARP replies
  • Forwarding and mangling packets
  • Local to remote Man in the Middle
  • DsniffArpspoof
19Module 19: "Metasploit"
  • MSFConsole
  • Identifying a vulnerable service
  • Searching
  • Configuring an exploit
  • Configuring a payload
  • Running an exploit
20Module 20: "Meterpreter"
  • Bind and reverse
  • Launching meterpreter
  • Sessions
  • Information gathering with meterpreter
  • Privilege escalation
  • Dumping the password database
  • Exploring the victim system
  • Uploading and downloading files
  • Running OS Shell
  • Beyond Remote Code Execution
21Module 21: "Forensic Investigation"
  • Computer Forensics Today
  • Computer Forensics Investigation Process
  • Hard Disks & File Systems
  • Data Acquisition
  • Anti-Forensics Techniques
  • Operating System Forensics
  • Network Forensics
  • Web Attack Investigation
  • Database Forensics
  • Forensics with the Cloud
  • Malware
  • Email Investigation
  • Mobile
  • Forensic Reporting
  • Course Summary

Benefits of learning Cyber security (IT) at Solve Tech Training Institute

  • Our experienced professionals are instructing this course.
  • Solve Tech provides you the facility to schedule the classes according to your availability.
  • Following each session, you'll receive the course material for your own future reference.
  • You will receive an internationally recognised certification after completing the course.

SOLVE TECH STUDENT BENEFITS


Focused Training
Placement Assistance
Lab Support
Expert Trainers

Flexible Timing
Interview Prepration
Hands on Training
Affordable Course Fee
Scan the code