Cybersecurity

SNo Module Chapter Coursework Trainer Hours Study Hours
1
Cybersecurity Essentials
Introduction to Cybersecurity What is Cybersecurity , Why do we need Cybersecurity , Current state of Cybersecurity 2 6
2 Understanding Hackers Introduction to Hacking ,Types of Hackers, Hacker Motivations, The Hacking Methodology 4 12
3 Networking 101 What is a computer network , Some Basic Networking Rules,Computer Protocols,LANs versus WANs, MAC versus IP Addresses,Switches versus Routers,TCP/IP Protocol Suite,How the Internet Works 4 12
4 Malware Threats Viruses and Worms ,Trojan Horses and Logic Bombs,Spyware and Adware, Ransomware and Rootkits,How Hackers Deploy Malware 4 12
5 Additional Threats and Vulnerabilities Zero Day Attacks , Buffer Overflows,Protocol Spoofing,DoS and DDoS Attacks,Weak Encryption & Software Vulnerability Attacks, Web-Based Attacks,Evil Twin and Rogue Access Points 4 12
6 Social And Email Based Threats Social Engineering Scenarios Overview,
Email Spam, Spoofing, Phishing, and Scam Websites
2 6
7 Core Cybersecurity Principles The CIA Triad , Defense in Depth, Least Privilege,Risk Management 2 6
8 Fundamental Threats and Countermeasures Multi Factor Authentication,Password Best Practices,Endpoint Protection, Encryption,Firewalls,Intrusion Detection & Prevention Systems (IDS/IPS),Utilizing a Network DMZ,Honeypot Decoys,Virtual Private Network (VPN),Wireless Networking Security 4 12
9 Cybersecurity in the Workplace Path Management and Change Management,Incident Response,Application Development Security,Security Assessments,Risk Management Program,Personnel Policies,Training, Education and Awareness 4 12
10
Ethical Hacking
Linux Basics Kali Basics,The Terminal & Linux Commands 16 48
11 Network Hacking Introduction,Pre Connection Attacks, WEP Cracking , WPA/WPA 2 Cracking, Security 16 48
12 Gaining Access Gaining Access to Computers,Server Side Attacks, Client Side Attacks,Social Enigneering, Hacking Outside the local network 24 72
13 Website Hacking Information Gathering, File Upload, Code Execution, File Inclusion Vuns, SQL Injection Vulnerabilities, Cross Site Scripting(XSS) Vulnerabilities, Discovering VulnerabilitiesAutomatically 20 60
14
VAPT
Introduction to VAPT Introduction,Phases of VAPT,Vulnerabilities,Exploits,Practicing Safe Exploitation,Walk through OWASP Juice Shop tutorial,3rd Party/Open Source Vulnerability management 10 30
15 Conducting a Vulnerability Assessment Asset Preparation,Asset Inventory Walkthrough,Conducting the Assessment,Demonstrating Nessus VA tool in action,VA Documentation 12 36
16 Penetration Testing Introduction to Penetration testing,Transitioning to Pen Testing - Phases,Criteria,Essential Techniques,Types of Penetration Tests,NIST and OWASP Guidelines,Input Validation Example Intro,Input Validation Example Tools: OWASP ZAP,Sqlmap, Kali Linux: NMAP Demonstration, Metasploit Demonstration,Reporting And Redemption Strategies 16 48
17 Application Security Security By Design,Secure Software development Lifecycle,Principles of Secure Coding,Overview of Application Security Testing Tool,Demonstration of an AppSec Tool: ,Intro to ML Security,Demonstration of a American Fuzzy Lop,Threats and Vulnerabilities in ML, Best practises and Tools for Securing ML Applications 20 60
18 DevSec Ops Intro to DevSecOps,DevSecOps Core Principles,Security as Code Concept,Software Composition Analysis,Demonstration of Fortify OSS,Containerization 12 36
19   Routers Goals and Learning Objectives,The Home Router,External Vulnerability Scanning - Shodan, Qualys & Nmap,Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS,Open Source Custom Router Firmware 18 54
20
Network Security
Firewalls Firewalls – Host-based, network-based and virtual ,Windows - Host Based Firewalls - Windows Firewall, Windows Firewall Control (WFC), Third Pary,Linux - Host Based Firewalls - iptables,UFW,gufw&nftables, Mac - Host based Firewalls - Application Firewall & PF,pflist,Icefloor &Murus,Little Snitch , Network based firewalls -Routers-DD-WRT,Hardware,pfsense,Smoothwall and vyos 12 36
21 Network Attacks, Architecture and Isolation Network Attacks and Network Isolation - Introduction and IOT,Arp Spoofing and Switches, Effective network Isolation 16 48
22 Wireless and Wifi Security Wi-Fi Weaknesses - WEP,WPA,WPA2,TKIP,CCMP,Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP,Wi-Fi Security Testing,Wireless Security - Secure Configuration and Network Isolation,RF Isolation and Reduction, Who is on my Wi-Fi Network?



 
8 24
23 Network Monitoring Threats Network Monitoring - Wireshark, tcpdump, tshark, iptables,Wireshark - Finding malware and hackers 12 36
24 How we are tracked Online Types of Tracking,IP Address,3rd Party Connections,HTTP Referer,Cookies and Scripts,Super Cookies,Browser Fingerprinting and Browser Volunteered Information,Browser and Browser Functionality,More TrackingBrowser and Internet Profiling 12 36
25 Search Engine and Privacy Search Engine Tracking, Censorship and Privacy,Ixquick and Startpage,DuckDuckGo,Disconnect search,YaCy,Private and Anonymous Searching 12 36
26 Browser Security and Tracking Prevention Which Browser – Choice of Browser,Reducing the Browser Attack Surface,Browser Isolation and Compartmentalization,Firefox Security, Privacy and Tracking,uBlock origin - HTTP Filters, ad and track blockers,uMatrix - HTTP Filters, ad and track blockers,Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers , ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers,No-script - HTTP Filters, ad and track blockers,Policeman and others - HTTP Filters, ad and track blockers,History, Cookies and Super cookies ,HTTP Referer,Browser Fingerprinting,Certificates and Encryption,Firefox Hardening 20 60
27 Password and Authentication Methods Password Attacks,How Passwords are Cracked - Hashes ,Operating System Passwords,Password Managers - An IntroductionMaster Password,KeePass,KeePassX,KeyPassXC,LastPass,Hardening Lastpass,Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy, Hard Tokens-2FA Dongles ,Coosing A method for multifactor Authentication 16 48
        302 906