Cyber Security

Duration: 6 weeks

Classes only on Weekends

Session 1 From Website Plus below content Understanding and Preventing Layer 2 Attacks
  • Attacks and Countermeasures
    • MAC Attacks
    • VLAN Hopping Attacks
    • DHCP Attacks
    • ARP Attacks
    • Spoofing Attacks
  • Firewalls Types and Characteristics
Session 2
  • Introduction to Ethical Hacking
    • Understanding Elements of Information Security
    • Understanding Information Security Threats and Attack Vectors
    • Overview of Hacking Concepts, Types and Phases
    • Understanding Ethical Hacking Concepts and Scope
    • Overview of Information Security Management and Defense-In-Depth
    • Overview of Policies Procedures and Awareness
    • Overview of Physical Security and Controls
    • Understanding Incident Management Process
    • Overview of Vulnerability Assessment and Penetration Testing
    • Overview of Information Security Acts and Laws
  • Footprinting and Reconnaissance (Techniques and Countermeasures)
    • Understanding Footprinting Concepts
    • Footprinting through Search engines
    • Footprinting using advanced Google Hacking techniques
    • Footprinting through Social Networking Sites
    • Understanding Different Techniques for Email Footprinting
    • Understandign Different Techniques for WHOIS and DNS Footprinting
    • Footprinting and Reconnaissance Counter measures
Session 3
  • Network Scanning (Methods and Countermeasures)
    • Understanding different techniques to check for Live Systems
    • Understanding different techniques to check for Open Ports
    • Understanding various Scanning Techniques
    • Understanding various IDS Evasion Techniques
    • Understanding Banner Grabbing
    • Using Proxies and Anonymizers for Attack
    • Understanding IP Spoofing and various Detection Techniques
    • Countermeasures of Network Scanning
  • Enumeration (Methods and Countermeasures)
    • Understanding Enumeration Concepts
    • Understanding Different Techniques for NetBIOS Enumeration
    • Understanding Different Techniques for SNMP Enumeration
    • Understanding Different Techniques for LDAP Enumeration
    • Understanding Different Techniques for NTP Enumeration
    • Understanding Different Techniques for SMTP and DNS Enumeration
    • Enumeration Countermeasures
  • System Hacking (Methods and Countermeasures)
    • Understanding Techniques to Gain Access to the System
    • Understanding Privilege Escalation Techniques
    • Understanding Techniques to Create and Maintain Remote Access to the System
    • Overview of Different Types of Rootkits
    • Overview of Steganography and Steganalysis Techniques
    • Understanding Techniques to Hide the Evidence of Compromise
Session 4
  • Network Sniffing (Methods and Countermeasures)
    • Overview of Sniffing Concepts
    • Understanding Network Sniffing Attacks
    • Use of Different Various Sniffing Tools
    • Implementing Sniffing Countermeasures
    • Understanding various techniques to detect Sniffing
  • Malware Threats
    • Introduction to Malware and Malware Propagation Techniques
    • Overview of Trojans, Their Types and How to Infect Systems
    • Overview of Viruses, Their Types, and How They Infect Files
    • Overview of Computer Warms, their Types and How to Infect Systems
    • Understanding the Malware Analysis Process
    • Understanding Different Techniques to Detect Malware
    • Malware Threats Countermeasures
  • Denial of Service Attacks and Countermeasures
    • Overview of Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
    • Understanding Different DoS/DDoS Attack Techniques
    • Understanding the Botnet Network
    • Understanding Various DoS and DDoS Attack Tools
    • Understanding Different Techniques to Detect DoS and DDoS Attacks
    • DoS/DDoS Countermeasures
Session 5
  • Evading Firewall, IDS and Honeypots
    • Understanding IDS, Firewall, and Honeypot Concepts
    • IDS, Firewall and Honeypot Solutions
    • Understanding Different Techniques for bypass IDS
    • Understanding Different Techniques for bypass Firewalls
    • Various tools for Evading IDS and Firewalls
    • Understanding different techniques to detect Honeypots
    • IDS/Firewall Evasion Countermeasures
  • Cryptography
    • Understanding Cryptography Concepts
    • Overview of Encryption Algorithms
    • Cryptography Tools
    • Understanding Public Key Infrastructure (PKI)
    • Understanding Email Encryption
    • Understanding Disk Encryption
    • Understanding Cryptography Attacks
    • Usage of Various Cryptanalysis Tools
  • Vulnerability Management Planning and Implementation
  • Tenable Nessus
    • Registration and Installation of Tenable Nessus
    • Host Discovery Scan through Nessus
    • Basic Host Scan
    • Advance host scan through Nessus
    • Fine tuning of Nessus scan engine
    • Exploration of all advanced options in Nessus Community Edition
  • IBM Qualys Guard
    • Registration and License acquisition of IBM Qualys Guard Scanner
    • Installation and Integration of IBM Qualys Guard Virtual Scanner
    • Host Discovery Scan through Qualys Guard
    • Advance host scan through Qualys Guard
    • Fine tuning of Qualys Guard scan engine
    • Exploration of all advanced options in Qualys Guard Community Edition
Session 6
  • Checkpoint Security Gateway
    • Understanding Architecture of Checkpoint Firewall
    • Installation of Checkpoint Security Gateway and Management Server
    • Implement NAT Policy
    • Implement Access Control Policy
    • Implement IPS Inspection Policy
    • Implementation of URL Filtering Policy
    • Log Analysis and Troubleshooting options in Checkpoint Security Gateway
    • Fine Tuning Options of Checkpoint Firewall
  • Dell SonicWall UTM
    • Demo of SonicWall UTM with various policies
    • Demo of NAT Policy and Firewall Policies in SoniWall UTM
    • Demo of all Security solutions of SonicWall UTM
  • Forensic Science
    • Computer Forensics in to Session’s World
    • Computer Forensics and Incident Handling.
    • Performing Forensic Analysis
    • Recovery and Post-Incident Response
Session 7
  • Cloud Security (AWS)
    • Introduction to AWS
    • Understanding Compliances through Amazon Artifact
    • Understanding Network ACLs
    • Understanding and use of Security groups
    • Understanding of AWS Certificate Manager
    • Understanding requirement of Cloud HSM
    • Understanding and Implementation of AWS Directory Service
    • Understanding AWS Guard Duty
    • Understanding AWS Inspector
    • Usage of AWS Secrets Manager
    • Understanding of AWS Single Sign-On
    • Understanding options in AWS WAF
    • Requirement and Understanding of AWS Shield
Session 8
  • Security Incident and Event Management (SIEM) Solution
    • Understanding need of SIEM Solution
    • Understanding Security Operation Center (SOC) Environment
    • Understanding Architecture and various components of McAfee SIEM
    • Installation of ESM, Receiver and ELM
    • Adding Data Sources to Receiver
    • Event Analysis and Filtering of Events
    • Create and Edit Dashboards
    • Create Alarm and Watchlists
    • Editing Policies through Policy Editor
    • Investigate events and Incidents
  • Compliances
    • Complying with Laws and Regulations
    • Overview, Understanding and usage of ISO 27001
    • Overview, Understanding and usage of SOC type reports
    • Overview, Understanding and usage of CIS Controls