Course Features
- Lectures 99
- Quizzes 0
- Duration 108 hours
- Skill level All levels
- Language English
- Students 25
- Assessments Yes
Curriculum
- 12 Sections
- 99 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Week 1/12: Starting up with Cyber Security & Kali Linux8
- 1.1Scope and Evolution of Cybersecurity & Information security1 Week
- 1.2Prerequisites of Cyber security1 Week
- 1.3Kali Linux and Different flavor of Linux for Hacking & pentesting1 Week
- 1.4Virtualization and OS installations1 Week
- 1.5Security for SOHO, Data Center, Cloud and virtual environment1 Week
- 1.6Common Security Principles1 Week
- 1.7Task 1: Open Source Information Gathering using Windows Command Line Utilities1 Week
- 1.8Task 2: Pentesting using Kali Linux1 Week
- Week 2/12: Kali vs Parrot Linux and Windows CMD6
- 2.1Kali vs Parrot Linux and Directory Structures
- 2.2Basic and admin commands, PowerShell, Commands Alias and Links
- 2.3Windows Registry and Windows CMD commands
- 2.4Secure Access Management
- 2.5Configure and verify secure access through SNMP v3
- 2.6Task 3: Use NMAP to scan a local network for active hosts and open ports
- Week 3/12: Malware Threats (Trojans, Viruses and Worms)9
- 3.1Describe the concepts of malware and malware propagation techniques
- 3.2Describe the concepts of Trojans, Viruses and Worms, their types, and how they infect systems
- 3.3Explain different techniques to detect malware
- 3.4Perform malware penetration testing
- 3.5Cisco Web Security Appliance (WSA)
- 3.6Install and Verify the Cisco WSA in various deployment scenarios
- 3.7Deploying WSA Proxy Services
- 3.8Task 4: Collecting Information about a Target Website using bugs
- 3.9Task 5: Mirroring Website using HTTrack Web Site Copier
- Week 4/12: Cryptography, Steganography and CIA8
- 4.1Encryption, Decryption, Public and Private Key
- 4.2SSL , TLS, PKI, Email Encryption
- 4.3Exploration of Steganography and Homography
- 4.4Hide payload with in picture and .pdf documents & .bat script
- 4.5Hide payload with in picture and .pdf documents & .bat script
- 4.6ASA Clustering and Spanned-EtherChannel
- 4.7Task 6: Creation of customized Public & Private key
- 4.8Task 7: Payload dispatch with .pdf documents
- Week 5/12: Scripting (Python & PHP)9
- 5.1Windows CMD commands
- 5.2PowerShell, Linux Shell and variables
- 5.3.bat Script and .sh Script
- 5.4Basic python scripts and Basic PHP scripts
- 5.5Dynamic Routing protocols
- 5.6VLANs and sub-interfaces in ASA
- 5.7Secure DMZ Design & implementation
- 5.8Task 8: Script creation using Python
- 5.9Task 9: Script creation using PHP
- Week 6/12: Cisco ASA Next Generation Firewalls and Windows Defender9
- 6.1Introducing the Cisco ASA 5500-X Series Next Generation Firewalls
- 6.2Introducing Cisco ASAv New Features and Installation of ASA 9.61v and its management via Cisco ASDM
- 6.3Service management with “systemctl” and Automate jobs with Crontab & window scheduler
- 6.4Windows Defender and real time Virus protection
- 6.5IP tables firewall and inbound & outbound traffic rules
- 6.6Basic Firewall initialization using CLI and ASDM
- 6.7Firewall Access Control
- 6.8Task 10: Preparation of EVE-NG based test bed for defensive and Offensive security
- 6.9Task 11: Cisco ASAv Features
- Week 7/12: Scanning Networks & Enumeration10
- 7.1Perform scanning to check for live systems and open ports
- 7.2Scan beyond Intrusion Detection System (IDS) and firewall
- 7.3Draw network diagrams using network discovery tools
- 7.4Perform scanning penetration testing
- 7.5Explain different techniques for NetBIOS enumeration
- 7.6Explain different techniques for SNMP, LDAP, NTP enumeration
- 7.7Explain different techniques for SNMP, LDAP, NTP enumeration
- 7.8Explain other enumerations such as IPsec, VolP, RPC, and Linux/Unix enumerations
- 7.9Task 12: Gathering IP and Domain Name Information using “Whois” Lookup
- 7.10Task 13: Advanced Network Route Tracing using Path Analyzer Pro
- Week 8/12: Server Apps & Denial of Service13
- 8.1Data sharing Apps
- 8.2DHCP Server and Clients
- 8.3DORA process
- 8.4DNS Server and clients
- 8.5DNS Record Types
- 8.6Virtualization / Context in ASA
- 8.7Firewall Deployment Modes
- 8.8Routed / Layer 3 design & Transparent mode
- 8.9Perform DoS/DDOS using various attack techniques
- 8.10Perform DoS/DDOS penetration testing
- 8.11Task 14: Configuring Object NAT and manual NAT with source & destination based schemes using Cisco ASA
- 8.12Task 15: SYN Flooding a Target Host using hping3 hping3
- 8.13Task 16: Performing Distributed Denial of Service Attack Using HOIC
- Week 9/12: Web Server & Mail Server10
- 9.1Apache and Nginx Web Server
- 9.2IIS Web Server
- 9.3XAMP and LAMP
- 9.4Mail Server with SMTP/POP/IMAP
- 9.5ASA Firewall High Availability
- 9.6Active-Passive deployment & Active-Active deployment
- 9.7Redundant Interfaces
- 9.8Aggregated Interfaces
- 9.9Task 17: Configure Active/Passive and Active/Active designs for High Availability. Implementation of Redundant and aggregated interfaces.
- 9.10Task 18: Analyzing a Network using Capsa Network Analyzer
- Week 10/12: Password Break (SAM Password, Linux/SHA512)7
- 10.1Windows Password Break and Cracking
- 10.2Linux Password Break and Cracking
- 10.3.pdf and .rar file Password Cracking
- 10.4BIOS Password & Mobile Password Breaking
- 10.5Cisco ASA FirePOWER / Cisco FTD
- 10.6Deployment Models
- 10.7Task 19: Sniff the traffic flowing between the client and the server for Sniffing Passwords.
- Week 11/12: Systems Hacking10
- 11.1Describe the Hacking Methodology
- 11.2Explain different techniques to gain access to the system
- 11.3Explain different techniques to create and maintain remote access to the system
- 11.4Describe different types of rootkits
- 11.5Apply different techniques to hide the evidence of compromise
- 11.6Perform system hacking penetration testing
- 11.7Intrusion Detection and Prevention (IPS) / SNORT Rules
- 11.8FirePOWER Reporting
- 11.9Real-time events & Logging
- 11.10Task 20: Session Hijacking using the Zed Attack Proxy (ZAP) The Zed Attack Proxy (ZAP)
- Week 12/12: Recap of Course & Final Project preparation0