Session 1 From Website Plus below content
Understanding and Preventing Layer 2 Attacks
- Attacks and Countermeasures
- MAC Attacks
- VLAN Hopping Attacks
- DHCP Attacks
- ARP Attacks
- Spoofing Attacks
- Firewalls Types and Characteristics
Session 2
- Introduction to Ethical Hacking
- Understanding Elements of Information Security
- Understanding Information Security Threats and Attack Vectors
- Overview of Hacking Concepts, Types and Phases
- Understanding Ethical Hacking Concepts and Scope
- Overview of Information Security Management and Defense-In-Depth
- Overview of Policies Procedures and Awareness
- Overview of Physical Security and Controls
- Understanding Incident Management Process
- Overview of Vulnerability Assessment and Penetration Testing
- Overview of Information Security Acts and Laws
- Footprinting and Reconnaissance (Techniques and Countermeasures)
- Understanding Footprinting Concepts
- Footprinting through Search engines
- Footprinting using advanced Google Hacking techniques
- Footprinting through Social Networking Sites
- Understanding Different Techniques for Email Footprinting
- Understandign Different Techniques for WHOIS and DNS Footprinting
- Footprinting and Reconnaissance Counter measures
Session 3
- Network Scanning (Methods and Countermeasures)
- Understanding different techniques to check for Live Systems
- Understanding different techniques to check for Open Ports
- Understanding various Scanning Techniques
- Understanding various IDS Evasion Techniques
- Understanding Banner Grabbing
- Using Proxies and Anonymizers for Attack
- Understanding IP Spoofing and various Detection Techniques
- Countermeasures of Network Scanning
- Enumeration (Methods and Countermeasures)
- Understanding Enumeration Concepts
- Understanding Different Techniques for NetBIOS Enumeration
- Understanding Different Techniques for SNMP Enumeration
- Understanding Different Techniques for LDAP Enumeration
- Understanding Different Techniques for NTP Enumeration
- Understanding Different Techniques for SMTP and DNS Enumeration
- Enumeration Countermeasures
- System Hacking (Methods and Countermeasures)
- Understanding Techniques to Gain Access to the System
- Understanding Privilege Escalation Techniques
- Understanding Techniques to Create and Maintain Remote Access to the System
- Overview of Different Types of Rootkits
- Overview of Steganography and Steganalysis Techniques
- Understanding Techniques to Hide the Evidence of Compromise
Session 4
- Network Sniffing (Methods and Countermeasures)
- Overview of Sniffing Concepts
- Understanding Network Sniffing Attacks
- Use of Different Various Sniffing Tools
- Implementing Sniffing Countermeasures
- Understanding various techniques to detect Sniffing
- Malware Threats
- Introduction to Malware and Malware Propagation Techniques
- Overview of Trojans, Their Types and How to Infect Systems
- Overview of Viruses, Their Types, and How They Infect Files
- Overview of Computer Warms, their Types and How to Infect Systems
- Understanding the Malware Analysis Process
- Understanding Different Techniques to Detect Malware
- Malware Threats Countermeasures
- Denial of Service Attacks and Countermeasures
- Overview of Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
- Understanding Different DoS/DDoS Attack Techniques
- Understanding the Botnet Network
- Understanding Various DoS and DDoS Attack Tools
- Understanding Different Techniques to Detect DoS and DDoS Attacks
- DoS/DDoS Countermeasures
Session 5
- Evading Firewall, IDS and Honeypots
- Understanding IDS, Firewall, and Honeypot Concepts
- IDS, Firewall and Honeypot Solutions
- Understanding Different Techniques for bypass IDS
- Understanding Different Techniques for bypass Firewalls
- Various tools for Evading IDS and Firewalls
- Understanding different techniques to detect Honeypots
- IDS/Firewall Evasion Countermeasures
- Cryptography
- Understanding Cryptography Concepts
- Overview of Encryption Algorithms
- Cryptography Tools
- Understanding Public Key Infrastructure (PKI)
- Understanding Email Encryption
- Understanding Disk Encryption
- Understanding Cryptography Attacks
- Usage of Various Cryptanalysis Tools
- Vulnerability Management Planning and Implementation
- Tenable Nessus
- Registration and Installation of Tenable Nessus
- Host Discovery Scan through Nessus
- Basic Host Scan
- Advance host scan through Nessus
- Fine tuning of Nessus scan engine
- Exploration of all advanced options in Nessus Community Edition
- IBM Qualys Guard
- Registration and License acquisition of IBM Qualys Guard Scanner
- Installation and Integration of IBM Qualys Guard Virtual Scanner
- Host Discovery Scan through Qualys Guard
- Advance host scan through Qualys Guard
- Fine tuning of Qualys Guard scan engine
- Exploration of all advanced options in Qualys Guard Community Edition
Session 6
- Checkpoint Security Gateway
- Understanding Architecture of Checkpoint Firewall
- Installation of Checkpoint Security Gateway and Management Server
- Implement NAT Policy
- Implement Access Control Policy
- Implement IPS Inspection Policy
- Implementation of URL Filtering Policy
- Log Analysis and Troubleshooting options in Checkpoint Security Gateway
- Fine Tuning Options of Checkpoint Firewall
- Dell SonicWall UTM
- Demo of SonicWall UTM with various policies
- Demo of NAT Policy and Firewall Policies in SoniWall UTM
- Demo of all Security solutions of SonicWall UTM
- Forensic Science
- Computer Forensics in to Session’s World
- Computer Forensics and Incident Handling.
- Performing Forensic Analysis
- Recovery and Post-Incident Response
Session 7
- Cloud Security (AWS)
- Introduction to AWS
- Understanding Compliances through Amazon Artifact
- Understanding Network ACLs
- Understanding and use of Security groups
- Understanding of AWS Certificate Manager
- Understanding requirement of Cloud HSM
- Understanding and Implementation of AWS Directory Service
- Understanding AWS Guard Duty
- Understanding AWS Inspector
- Usage of AWS Secrets Manager
- Understanding of AWS Single Sign-On
- Understanding options in AWS WAF
- Requirement and Understanding of AWS Shield
Session 8
- Security Incident and Event Management (SIEM) Solution
- Understanding need of SIEM Solution
- Understanding Security Operation Center (SOC) Environment
- Understanding Architecture and various components of McAfee SIEM
- Installation of ESM, Receiver and ELM
- Adding Data Sources to Receiver
- Event Analysis and Filtering of Events
- Create and Edit Dashboards
- Create Alarm and Watchlists
- Editing Policies through Policy Editor
- Investigate events and Incidents
- Compliances
- Complying with Laws and Regulations
- Overview, Understanding and usage of ISO 27001
- Overview, Understanding and usage of SOC type reports
- Overview, Understanding and usage of CIS Controls
Pre-requisite for Program: Basic understanding of Operating Systems, Good understanding of Networking concepts
Job roles: Security Engineer, Cyber Security Specialist, Cyber Security Analyst, Ethical Hacker