|
Introduction to Cyber Security
|
|
|
|
Different types of hackers
|
|
|
|
Ethical hacking methodologies
|
|
|
|
Legal and ethical considerations
|
|
|
|
Introduction to Ethical Hacking
(12 pages)
|
|
|
Networking Fundamentals
|
|
|
|
TCP/IP protocols
|
|
|
|
Network architecture
|
|
|
|
Subnetting and IP addressing
|
|
|
|
Network scanning and enumeration
|
|
|
Linux Administration for Cyber Security
|
|
|
|
Linux Basics Day-1
|
|
|
|
Linux Basics Day-2
|
|
|
CompTIA Security+ Certification
|
|
|
Kali Linux and Penetration Testing
|
|
|
Certified Ethical Hacking
|
|
|
|
Introduction to Ethical Hacking
|
|
|
|
Introduction to Ethical Hacking
(12 pages)
|
|
|
|
Footprinting and Reconnaissance
|
|
|
|
Footprinting and Reconnaissance
|
|
|
|
Footprinting and Reconnaissance
(16 pages)
|
|
|
|
Scanning Networks
|
|
|
|
Scanning Networks
(18 pages)
|
|
|
Module 6: Network Security and Firewalls
|
|
|
|
Vulnerability scanning
|
|
|
|
System fingerprinting
|
|
|
|
Identifying software vulnerabilities
|
|
|
|
Exploitation frameworks
|
|
|
Module 7: Security Operations and Incident Response
|
|
|
|
Web application architecture
|
|
|
|
Common web vulnerabilities (e.g., XSS, SQLi)
|
|
|
|
Web application scanning and testing
|
|
|
|
Securing web applications
|
|
|
Module 7: Security Operations and Incident Response
|
|
|
|
Firewalls and IDS/IPS
|
|
|
|
Intrusion detection and prevention
|
|
|
|
Wireless network security
|
|
|
|
VPN and tunneling
|
|
|
Module 8: Cloud Security and Virtualization
|
|
|
|
Malware analysis and reverse engineering
|
|
|
|
Network packet analysis
|
|
|
|
Password cracking
|
|
|
|
Wireless network hacking
|
|
|
Module 9: Advanced Cyber Security Certifications Preparation
|
|
|
|
Ethical considerations in hacking
|
|
|
|
Laws and regulations related to cybersecurity
|
|
|
|
Professional certifications and standards
|
|
|
|
Reporting vulnerabilities responsibly
|
|
|
Module 10: Capstone Project: Real-World Cyber Security Scenario
|
|
|
|
Chapter 10.1: Hands-On Penetration Testing Project
|
|
|
|
Chapter 10.2: Configuring Firewalls and Implementing Security Policies
|
|
|
|
Chapter 10.3: Incident Response Simulation
|
|