Cyber Security training is targeted to engineers and technical personnel involved in deploying, implementing and operating optimizing and maintaining Network Security, Server Security, Data & Information Security, Web Application Security, Red & Blue Teaming, Threat & Malware Analysis both in enterprise infrastructure and Web Service environments, including advanced feature like CTF Challenges and security in real world scenarios. The Cyber Security covers a breadth of topics like enumeration, vulnerability assessment & penetration testing, Security Logging, SOC Operations, DLP, SIEM Implementation, malware analysis and blockchain fundamentals. Cyber Security is a lab-intensive course and objectives are accomplished mainly through hands-on learning.
The key to a high success rate is based on the program’s objectives as follows:
- Course contents are based on the latest Cyber Security trends.
- Dedicated Monitoring to evaluate and report candidates progress
- Extensive hands-on lab exercises
- Industry-acclaimed, experienced and certified instructors
Course Topics
This course is created to impart knowledge and skills related to security fundamentals, network access, information security, web application security and malware analysis. This course will help candidates prepare to tackle real world cyber security incidents. The following topics are general guidelines to better reflect the contents of the course and for clarity purposes, the guidelines below may change at any time without notice.
- Cyber Security Introduction & Overview
- Examining Cyber Security concepts and current trends
- Cyber Security Fields and Components
- Examining widely used Security Platforms
- Examining widely used Security Software Licensing
- Cyber Security Implementation Use Cases
- Cyber Attacks
- Understanding Kali Linux
- Understanding Attack Preparation Guidelines
- Reconnaissance and Footprinting using various tools
- Network, Host and services scan & discovery using various tools
- Enumeration using nmap & zenmap
- Vulnerability Assessment using Nessus & Nexpose
- Exploitation using MSF and various other techniques
- Post Exploitation using various tools
Data Security Basics
- Data Gathering
- Data Classification
- Users, Roles & Permission
- Policy Development
- Splunk
- Understanding Splunk Architecture
- Understanding Splunk Use Cases
- Installing Splunk on Linux
- Installing Splunk on Windows
- Adding Linux Logs to Splunk
- Adding Windows Logs to Splunk
- Understanding Splunk Search Head
- Understanding Splunk Forwarder
- Understanding Splunk Indexer
- Understanding Splunk Deployment server
- McAfee ePO
- Installation of McAfee ePO Server
- Configuring McAfee ePO Dashboards
- Product Installation
- Software & Repository Management
- System Tree
- Policy Catalog
- User Management
- AAA
- Active Directory Synchronization
- DLP
- Agent-Server Communication
- Agent Deployment
- Policy development
- Pushing Policy and Software using agents
- Queries & Reports
- Blockchain Fundamentals
- What is Blockchain
- Byzantine General Problem
- Gartner Hype Curve
- How Blockchain Works
- Why Blockchain
- Mining Page
- Transaction Life Cycle
- Types of network
- Cryptography and Hashing
- Blockchain Vocabulary
- Block number, Nonce, Hash, Timestamp, Merkle root
- Transaction,Transaction Fee, Merkle Tree
- Mining, Block Reward, Soft fork
- Hard Fork
- Longest Chain Wins
- Orphan Bloc
- Block Hash
- Test Network, Main Network
- Double spending attack, Sybil attack, 51%attack
- Practical Byzantine Fault Tolerance (PBFT)
- CryptoCurrency : Bitcoin and Ethereum
- World Of Cryptocurrency
- Bitcoin
- Bitcoin Handson
- Smart Contracts
- Solidity gas overview
- Types and Applications of Blockchain
- Types of blockchain
- Applications of Blockchain
- Bitcoin core Blockchain
- Wallets in Blockchain