- Overview
- Prerequisites
- Audience
- Audience
- Curriculum
Description:
Explore the fundamentals of cybersecurity, learn to identify and mitigate security threats, understand ethical hacking principles, and gain hands-on experience with various cybersecurity tools and techniques. This course covers a broad range of topics including security architecture, cryptography, network security, and identity and access management.
Cybersecurity is crucial for protecting organizational assets in today's digital world. This comprehensive course provides an in-depth understanding of cybersecurity concepts and ethical hacking techniques. Participants will learn about security governance, ethical hacking phases, penetration testing, web application security, cryptography, and identity and access management. Hands-on labs and practical exercises will enable participants to apply their knowledge in real-world scenarios.
By the end of this course, participants will be equipped with the knowledge and skills required to implement robust security measures, conduct penetration tests, and secure computer networks and applications.
Duration: 5 Days
Course Code: BDT 353
Learning Objectives:
After this course, you will be able to:
- Understand the need for cybersecurity and ethical hacking
- Learn about the CIA Triad and security architecture
- Understand security governance, auditing, regulations, and frameworks
- Explore different types of hackers and phases of ethical hacking
- Conduct penetration testing and identify network routes
- Analyze and secure web applications
- Learn about cryptographic techniques and attacks on cryptosystems
- Understand computer network architecture and common network threats
- Implement identity and access management principles
- Perform hands-on labs using various cybersecurity tools
- Basic understanding of computer networks and operating systems
- Familiarity with basic security concepts
- This course is designed for IT Professionals, Network Administrators, Security Analysts, Security Engineers, Ethical Hackers, and anyone interested in learning about cybersecurity and ethical hacking. It is also suitable for individuals aiming to strengthen their organization's security posture or prepare for cybersecurity certification exams.
- This course is designed for IT Professionals, Network Administrators, Security Analysts, Security Engineers, Ethical Hackers, and anyone interested in learning about cybersecurity and ethical hacking. It is also suitable for individuals aiming to strengthen their organization's security posture or prepare for cybersecurity certification exams.
Course Outline:
Module 1: Introduction to Cybersecurity & Ethical Hacking
- Need for Cybersecurity
- CIA Triad
- Security Architecture
- Security Governance
- Security Auditing
- Regulations & Frameworks
- Ethical Hacking
- Types of Hackers
- Phases of Ethical Hacking
- Penetration Testing
- Types of Penetration Testing
- Footprinting
Hands-On:
- Footprinting a website using tools
- Gathering information about a domain through tools
- DNS Footprinting using DNS Interrogation Tools
- Identify the Network Routes in the System
- DNS lookup and reverse lookup
- Network Path tracing
- Network Analysis
- Network scanning
- Enumeration
Module 2: Application and Web Security
- Web server architecture
- Web server attacks
- Countermeasures and patch management
- Web application architecture
- Web application attacks
Hands-On:
- Capturing session ID with Burp Suite
- Local File Inclusion on bWAPP
Module 3: Cryptography
- Types of cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Hash functions
- Digital signatures
- Public Key Infrastructure (PKI)
- Attacks on cryptosystems
Hands-On:
- Generating and identifying hashes
- Signing a file with digital signatures
Module 4: Computer Networks & Security
- Introduction to Computer Networks
- Computer Networks – Architecture
- Layered architecture
- Open Systems Interconnect (OSI) Model
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Network Scanning
- Enumeration
- Common Network Threats/Attacks
Module 5: IdAM (Identity and Access Management)
- Authentication and authorization
- Authentication and authorization principles
- Regulation of access
- Access administration
- IdAM
- Password protection
- Identity theft
Hands-On:
- Adding and granting permissions to users in Linux
- Identifying phishing websites
Module 6: Structured Activity/Exercises/Case Studies:
- Lab: Footprinting a website using tools
- Lab: Gathering information about a domain through tools
- Lab: DNS Footprinting using DNS Interrogation Tools
- Lab: Identify the Network Routes in the System
- Lab: DNS lookup and reverse lookup
- Lab: Network Path tracing
- Lab: Network Analysis
- Lab: Network scanning
- Lab: Enumeration
- Lab: Capturing session ID with Burp Suite
- Lab: Local File Inclusion on bWAPP
- Lab: Generating and identifying hashes
- Lab: Signing a file with digital signatures
- Lab: Adding and granting permissions to users in Linux
- Lab: Identifying phishing websites
Training Material Provided:
Yes (Digital format)