SNo | Module | Chapter | Coursework | Trainer Hours | Study Hours |
---|---|---|---|---|---|
1 |
Cybersecurity Essentials
|
Introduction to Cybersecurity | What is Cybersecurity , Why do we need Cybersecurity , Current state of Cybersecurity | 2 | 6 |
2 | Understanding Hackers | Introduction to Hacking ,Types of Hackers, Hacker Motivations, The Hacking Methodology | 4 | 12 | |
3 | Networking 101 | What is a computer network , Some Basic Networking Rules,Computer Protocols,LANs versus WANs, MAC versus IP Addresses,Switches versus Routers,TCP/IP Protocol Suite,How the Internet Works | 4 | 12 | |
4 | Malware Threats | Viruses and Worms ,Trojan Horses and Logic Bombs,Spyware and Adware, Ransomware and Rootkits,How Hackers Deploy Malware | 4 | 12 | |
5 | Additional Threats and Vulnerabilities | Zero Day Attacks , Buffer Overflows,Protocol Spoofing,DoS and DDoS Attacks,Weak Encryption & Software Vulnerability Attacks, Web-Based Attacks,Evil Twin and Rogue Access Points | 4 | 12 | |
6 | Social And Email Based Threats | Social Engineering Scenarios Overview, Email Spam, Spoofing, Phishing, and Scam Websites |
2 | 6 | |
7 | Core Cybersecurity Principles | The CIA Triad , Defense in Depth, Least Privilege,Risk Management | 2 | 6 | |
8 | Fundamental Threats and Countermeasures | Multi Factor Authentication,Password Best Practices,Endpoint Protection, Encryption,Firewalls,Intrusion Detection & Prevention Systems (IDS/IPS),Utilizing a Network DMZ,Honeypot Decoys,Virtual Private Network (VPN),Wireless Networking Security | 4 | 12 | |
9 | Cybersecurity in the Workplace | Path Management and Change Management,Incident Response,Application Development Security,Security Assessments,Risk Management Program,Personnel Policies,Training, Education and Awareness | 4 | 12 | |
10 |
Ethical Hacking
|
Linux Basics | Kali Basics,The Terminal & Linux Commands | 16 | 48 |
11 | Network Hacking | Introduction,Pre Connection Attacks, WEP Cracking , WPA/WPA 2 Cracking, Security | 16 | 48 | |
12 | Gaining Access | Gaining Access to Computers,Server Side Attacks, Client Side Attacks,Social Enigneering, Hacking Outside the local network | 24 | 72 | |
13 | Website Hacking | Information Gathering, File Upload, Code Execution, File Inclusion Vuns, SQL Injection Vulnerabilities, Cross Site Scripting(XSS) Vulnerabilities, Discovering VulnerabilitiesAutomatically | 20 | 60 | |
14 |
VAPT
|
Introduction to VAPT | Introduction,Phases of VAPT,Vulnerabilities,Exploits,Practicing Safe Exploitation,Walk through OWASP Juice Shop tutorial,3rd Party/Open Source Vulnerability management | 10 | 30 |
15 | Conducting a Vulnerability Assessment | Asset Preparation,Asset Inventory Walkthrough,Conducting the Assessment,Demonstrating Nessus VA tool in action,VA Documentation | 12 | 36 | |
16 | Penetration Testing | Introduction to Penetration testing,Transitioning to Pen Testing - Phases,Criteria,Essential Techniques,Types of Penetration Tests,NIST and OWASP Guidelines,Input Validation Example Intro,Input Validation Example Tools: OWASP ZAP,Sqlmap, Kali Linux: NMAP Demonstration, Metasploit Demonstration,Reporting And Redemption Strategies | 16 | 48 | |
17 | Application Security | Security By Design,Secure Software development Lifecycle,Principles of Secure Coding,Overview of Application Security Testing Tool,Demonstration of an AppSec Tool: ,Intro to ML Security,Demonstration of a American Fuzzy Lop,Threats and Vulnerabilities in ML, Best practises and Tools for Securing ML Applications | 20 | 60 | |
18 | DevSec Ops | Intro to DevSecOps,DevSecOps Core Principles,Security as Code Concept,Software Composition Analysis,Demonstration of Fortify OSS,Containerization | 12 | 36 | |
19 | Routers | Goals and Learning Objectives,The Home Router,External Vulnerability Scanning - Shodan, Qualys & Nmap,Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS,Open Source Custom Router Firmware | 18 | 54 | |
20 |
Network Security
|
Firewalls | Firewalls – Host-based, network-based and virtual ,Windows - Host Based Firewalls - Windows Firewall, Windows Firewall Control (WFC), Third Pary,Linux - Host Based Firewalls - iptables,UFW,gufw&nftables, Mac - Host based Firewalls - Application Firewall & PF,pflist,Icefloor &Murus,Little Snitch , Network based firewalls -Routers-DD-WRT,Hardware,pfsense,Smoothwall and vyos | 12 | 36 |
21 | Network Attacks, Architecture and Isolation | Network Attacks and Network Isolation - Introduction and IOT,Arp Spoofing and Switches, Effective network Isolation | 16 | 48 | |
22 | Wireless and Wifi Security | Wi-Fi Weaknesses - WEP,WPA,WPA2,TKIP,CCMP,Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP,Wi-Fi Security Testing,Wireless Security - Secure Configuration and Network Isolation,RF Isolation and Reduction, Who is on my Wi-Fi Network? |
8 | 24 | |
23 | Network Monitoring Threats | Network Monitoring - Wireshark, tcpdump, tshark, iptables,Wireshark - Finding malware and hackers | 12 | 36 | |
24 | How we are tracked Online | Types of Tracking,IP Address,3rd Party Connections,HTTP Referer,Cookies and Scripts,Super Cookies,Browser Fingerprinting and Browser Volunteered Information,Browser and Browser Functionality,More TrackingBrowser and Internet Profiling | 12 | 36 | |
25 | Search Engine and Privacy | Search Engine Tracking, Censorship and Privacy,Ixquick and Startpage,DuckDuckGo,Disconnect search,YaCy,Private and Anonymous Searching | 12 | 36 | |
26 | Browser Security and Tracking Prevention | Which Browser – Choice of Browser,Reducing the Browser Attack Surface,Browser Isolation and Compartmentalization,Firefox Security, Privacy and Tracking,uBlock origin - HTTP Filters, ad and track blockers,uMatrix - HTTP Filters, ad and track blockers,Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers , ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers,No-script - HTTP Filters, ad and track blockers,Policeman and others - HTTP Filters, ad and track blockers,History, Cookies and Super cookies ,HTTP Referer,Browser Fingerprinting,Certificates and Encryption,Firefox Hardening | 20 | 60 | |
27 | Password and Authentication Methods | Password Attacks,How Passwords are Cracked - Hashes ,Operating System Passwords,Password Managers - An IntroductionMaster Password,KeePass,KeePassX,KeyPassXC,LastPass,Hardening Lastpass,Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy, Hard Tokens-2FA Dongles ,Coosing A method for multifactor Authentication | 16 | 48 | |
302 | 906 |