Course Overview

Cyber Security & Ethical Hacking

Rated 0 out of 5
(0 customer review)

Description

 **Cyber Security & Ethical Hacking Outline**
*(Duration: 6 Months)*

**Week 1: Introduction to Cybersecurity and Cyberspace**
– An overview of cybersecurity and cyberspace, including the importance of protecting digital assets and the impact of cyber threats on individuals and organizations.
– Cybersecurity Fields and Job Roles: A discussion of the various fields and job roles within the cybersecurity industry.
– CIA Triads: An explanation of the CIA triad (confidentiality, integrity, availability) in cybersecurity.
– Cybersecurity Platforms: An exploration of different cybersecurity platforms.
– Capture the Flag (CTF): A practical exercise in which students apply knowledge and skills.

**Week 2: Introduction to Networking**
– Overview of networking concepts and technologies.
– Network Addresses and Devices: Explanation of network addresses and devices.
– Network Services and Protocols: Introduction to network services and protocols.
– Network Models: Overview of network models such as the OSI model and TCP/IP model.

**Week 3: Understanding Computer Hardware**
– Introduction to basic hardware components.
– In-depth study of hardware components.
– Different GPU, PSU, Displays, Ports.
– Practical Demonstration of Computer Hardware.
– Introduction to Operating Systems and Booting Process.

**Week 4: Introduction to Linux**
– Overview of Linux and its history.
– Linux Installation.
– Directory Structure in Linux.
– Basic File Commands in Linux.
– CTF on Linux.

**Week 5: Absolute Path and Relative Path**
– Explanation of absolute and relative paths in Linux.
– Creating and Removing Files in Linux.
– Creating and Removing Directories in Linux.
– Copying and Moving Files in Linux.
– CTF on File Manipulation in Linux.

**Week 6: Root User in Linux**
– Explanation of the root user in Linux.
– Introduction to Groups in Linux.
– Creating and Modifying Users in Linux.
– Creating and Modifying Groups in Linux.
– Managing Users and Groups Permissions in Linux.

**Week 7: File and Directory Permissions**
– Explanation of file and directory permissions in Linux.
– Changing File Permissions in Linux.
– Ownership Permission of Files in Linux.
– Sudoers File and Restricting Users to Run Commands.
– CTF on Permission-related Topics.

**Week 8: Introduction to Packages**
– Overview of Linux packages.
– Installing and Removing Packages in Linux.
– Processes and Daemons in Linux.
– Networking Commands in Linux.
– Logs in Linux.

**Week 9: Configuring Web Server**
– Installation and configuration of a web server.
– Configuring DHCP Server.
– Configuring SMTP Server.
– Configuring SSH Server.
– Configuring FTP Server.

**Week 10: Hacker Methodology**
– Stages of a hacker’s methodology.
– OSINT and Web OSINT.
– Google Dorking.

**Week 11: Introduction to Web Fundamentals**
– Overview of web fundamentals, including HTTP protocol and web servers.
– Web Server Working and Directory Structure.
– HTTP Methods and Status Codes.
– CTF on Web Fundamentals.

**Week 12: Introduction to Cryptography**
– Basics of cryptography, encoding, encryption, and hashing algorithms.
– Decoding and Decryption, Hash Cracking.

**Week 13: Introduction to Password Attacks**
– Types of password attacks, Brute-Force and Wordlist Attacks.
– Cracking Passwords using Different Attack Techniques.
– CTF on Password Attacks.

**Week 14: Introduction to Steganography**
– Basics of Steganography, Meta Data, and Image Signatures.
– Using Steganography Techniques to Hide Data.
– CTF on Steganography.

**Week 15: Introduction to Layer 2 Attacks**
– Understanding Layer 2 and various attacks.
– Sniffing, Spoofing, MITM Attacks, and Protection.

**Week 16: Introduction to WiFi Attacks**
– WiFi Attacks, WiFi Password Attacks, Evil Twin Attack, DOS Attack on WiFi, Protection.

**Week 17: Introduction to Social Engineering Attacks**
– Types of social engineering attacks, Phishing Attacks using Websites and Emails.
– Detecting Phishing Attacks and Preventing Them.

**Week 18: Introduction to Computer Viruses and Their Types**
– Computer viruses, Designing Payloads for Windows, Android, and Linux.
– Protecting Yourself from Virus Attacks.

**Week 19: Network Scanning and Vulnerability Assessment**
– Network scanning and vulnerability assessment techniques.
– Exploitation and Reporting.
– CTF on Scanning and Vulnerability Assessment.

**Week 20: Introduction to Web Pentesting**
– Web pentesting fundamentals and OWASP TOP 10.
– Web attacks using tools like Burpsuite, Nikto, Zap.
– CTF on Web Pentesting.

**Week 21: Introduction to Python for Pentesters**
– Basic Python programming.
– Designing Hacking Tools and Keyloggers using Python.

**Week 22: Scanning and Vulnerability Assessment**
– Network scanning and vulnerability assessment.
– Exploitation and Reporting.

**Week 23: Introduction to Cybersecurity and SOC Operations**
– Cybersecurity fundamentals and SOC operations.
– SIEM Tools, Log Management, and Threat Intelligence.
– SIEM Tuning and Configuration.

**Week 24: Network Security Monitoring and Analysis**
– Network security monitoring and IDPS.
– Vulnerability assessment and Firewall rules.
– Threat hunting and analytics.

**Week 25: Introduction to the Dark Web**
– Dark Web basics, Installing Tor, Exploring the Dark Web.
– Anonymity and Security on the Dark Web.
– Hosting your Own Dark Web.

**Week 26: CEH Labs**
● CEH V11 Lab1
● CEH V11 Lab 2
● CEH V11 Lab 3
● CEH V11 Lab 4
● CEH V11 Lab 5

 

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
App Development With React Native

App Development With React Native

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
Cyber Security for kids

Cyber Security for kids

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
MS Office

MS Office

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
Wifi Hacking 101

Wifi Hacking 101

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
Web Design & Development Using (PHP)

Web Design & Development Using (PHP)

CompareAdded
Add to WishlistBrowse Wishlist
Quick View
Full stack Web  Development (MERN Stack)

Full stack Web Development (MERN Stack)