Cybersecurity or information technology security (IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.
The field is growing in importance due to increasing reliance on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions and the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.
The growth in the number of computer systems, and the increasing reliance upon them of individuals, businesses, industries and governments means that there are an increasing number of systems at risk.
Information Security Overview
What Happens Online in 60 Seconds
Elements of Information Security
The Security, Functionality, and Usability Triangle
Hacking Concepts
What is Hacking?
Who is a Hacker?
Hacker Classes
Hacking Phases
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Tracks
Ethical Hacking Concepts
What is Ethical Hacking?
Why Ethical Hacking is Necessary
Scope and Limitations of Ethical Hacking
Skills of an Ethical Hacker
Information Security Controls
Information Assurance (IA)
Information Security Management Program
Enterprise Information Security Architecture (EISA)
Network Security Zoning
Defense-in-Depth
Penetration Testing Concepts
Penetration Testing
Why Penetration Testing
Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
Blue Teaming/Red Teaming
Types of Penetration Testing
Phases of Penetration Testing
Security Testing Methodology
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Website Footprinting
Email Footprinting
Indexing & Selecting Data
Competitive Intelligence
Whois Footprinting
DNS & Network Footprinting
Footprinting through Social Engineering
Footprinting Tools
Scanning Networks
Network Scanning Concepts
Scanning Tools
Scanning Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Scanning Pen Testing
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing
Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Malware Penetration Testing
Sniffing
Sniffing Concepts
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attacks
DNS Poisoning
Social Engineering
Social Engineering Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
Denial-of-Service
DoS/DDoS Attack Techniques
Botnets
DDoS Case Study
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools
Session Hijacking
Application Level Session Hijacking
Network Level Session Hijacking
Session Hijacking Tools
DoS/DDoS Attack Tools
DoS/DDoS Protection Tools
Hacking Web Servers
Web Server Attacks
Web Server Attack Tools
Web Server Security Tools
Patch Management
Hacking Web Applications
Web App Threats
Hacking Methodology
Web App Hacking Tools
Web App Security Testing Tools
Web App Pen Testing
SQL Injection
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Hacking Wireless Networks
Wireless Encryption
Wireless Threats
Wireless Hacking Tools
Bluetooth Hacking
Wireless Security Tools
Wireless Pen Testing
Hacking Mobile Platforms
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Pen Testing
IoT Hacking
IoT Attacks
IoT Hacking Methodology
IoT Hacking Tools
IoT Pen Testing
Cloud Computing
Cloud Computing Threats
Cloud Computing Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing
Cryptography
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis
Countermeasures
2-2.5 hours/day
Total 20 days (40-45 hours)
Fees per head
Start your growth with us today!