Description
In this course, you will learn :
- Introduction to Cyber security & Ethical Hacking
- Need of Cybersecurity
- CIA Triad
- Security Architecture
- Security Governance
- Security Auditing
- Regulations & Frameworks
- Ethical Hacking
- Types of Hackers
- Phases of Ethical Hacking
- Penetration Testing
- Types of Penetration Testing
- Footprinting
- Objectives of Footprinting
- Types of Footprinting
- Footprinting Techniques
- Cryptography
- Types of cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Hash functions
- Digital signatures
- Public Key Infrastructure (PKI)
- Attacks on cryptosystems
- Computer Networks & Security
- Introduction to Computer Network
- Computer Networks - Architecture
- Layered architecture
- Open Systems Interconnect (OSI) Model
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Network Scanning
- Enumeration
- Common Network Threats/Attacks
- Application and Web Security
- Web server architecture
- Web server attacks
- Countermeasures and patch management
- Web application architecture
- Web application attacks
- IdAM (Identity and Access Management)
- Authentication and authorization
- Authentication and authorization principles
- Regulation of access
- Access administration
- IdAM
- Password protection
- Identity theft
- Vulnerability Analysis & System Hacking
- Vulnerability Analysis
- Types of Vulnerability Analysis
- Vulnerability Assessment Lifecycle
- Vulnerability Assessment Tools
- Vulnerability Scoring Systems
- Vulnerability Assessments Report
- System Hacking
- Password Cracking
- Privilege escalation
- Executing Applications
- Hiding Files
- Clearing Logs
- Sniffing and SQL Injection
- Malware and its propagation ways
- Malware components
- Types of malware
- Concept of sniffing
- Types of sniffing
- Types of sniffing attacks
- SQL injection
- Types of SQL injection
- SQL injection Methodologies
- DoS and Session Hijacking
- DoS attack
- DDoS attack
- Common symptoms of DoS/DDoS attack
- Categories of DoS/DDoS Attack Vectors
- DoS/DDoS detection techniques
- Session hijacking
- Application level session hijacking
- Network level session hijacking
- Intrusion Detection System (IDS)
- Types of Intrusion Detection Systems
- Introduction to Firewalls
- Types of Firewalls
- Introduction to Honeypots
- Evading IDS