Cyber Security Expert Analyst
Course Key Features
- Become a cyber security expert – Go from a beginner to advanced in this easy to follow expert course.
- Covering all the major platforms Windows, MacOS, Linux, iOS and Android.
- Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption
attacks. - Understand the current and next generation anti-virus solutions, how they work, how to select the best products
and how to implement them successfully. - Covering traditional end-point-protection technologies through to next generation and future technology;
application control, execution prevention, machine learning and Artificial Intelligence. - Learn how we can detect and monitor for threats such as malware and hackers through the use of security through
deception and detection technologies. - We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker
hunting! - Learn how to perform operating system hardening to decrease the attacker surfaces of your devices
to make them safer. - Explore the best techniques in anti-forensics to securely delete data and meta-data so that
it is unrecoverable by even computer forensics experts.
Curriculum Of Our Cyber Security Course
Module 1: Introduction to Ethical Hacking
- What is hacking?
- Types of attacks on a system
- Information security threat categories
- Threats
- Ethical hacking concepts
- Information security controls
- Penetration Testing Concepts
Module 2:Footprinting and Reconnaissance
- Types of footprinting
- Footprinting through Search Engines
- Types of footprinting
- Web services
- Social networking sites
- Additional footprinting tools
- Footprinting Countermeasures
- Footprinting pen testing
Module 03: Scanning Networks
- Introduction to Network Scanning
- Network scanning concepts, tools and techniques
- Network diagrams
- Scanning pen testing
Module 04: Enumeration
- What is Enumeration?
- Enumeration concepts
- Techniques for enumeration
- Enumeration Countermeasures
- Enumeration Pen Testing
Module 05: Vulnerability Analysis
- What is vulnerability assessment?
- Vulnerability Assessment Concepts
- Vulnerability scanning solutions
- Vulnerability Scoring Systems
- Tools, and reports
Module 06: System Hacking
- Learn how to crack passwords
- Hide files
- Cover tracks
Module 07: Malware Threats
- Introduction to malware
- Malware concepts
- Trojan concepts
- Malware analysis, countermeasures
- Malware penetration testing
Module 08: Sniffing
- Sniffing concepts
- Network sniffing
- Tools
- Types of sniffing
- Techniques
Module 09: Social Engineering
- What is social engineering?
- Social Engineering Concepts
- Types of social engineering
- Techniques
- Countermeasures
Module 10: Denial-of-service
- What is a Denial-of-Service attack?
- DoS/DDoS Attack Techniques
- DoS/DDoS Attack Tools
- DDoS Case Study
- Penetration testing
Module 11: Session Hijacking
- Session Hijacking Concepts
- What is session hijacking?
- Types of Session hijacking
- Countermeasures
- Penetration Testing
Module 12: Evading IDS, Firewalls, Honeypots
- IDS, Firewall and Honeypot Concepts
- Intrusion Detection System (IDS)
- Firewall
- Honeypot
Module 13: Hacking Web Servers
- Open source web server architecture
- Web server concepts, attacks, methodologies
- Web Server Security Tools
- Countermeasures
- Web server penetration testing
Module 14: Hacking Web Applications
- Introduction to web applications
- Web app concepts
- Web application architecture
- Web App Hacking Tools
- Web app hacking methodology
- Countermeasures
- Web application pen testing
Module 15: SQL Injection
- What is SQL injection?
- SQL Injection concepts
- Types of SQL Injection
- SQL Injection Methodology & tools
Module 16: Hacking Wireless Networks
- Wireless concepts
- Wireless terminologies, networks, and standards
- Wireless Threats
- Methodologies
Module 17: Hacking Mobile Platforms
- Vulnerable areas in mobile business environment
- Mobile Platform Attack Vectors
- Anatomy of a mobile attack
- Hacking Android OS
- Hacking iOS
Module 18: IoT Hacking
- IoT Concepts
- What is IoT?
- How does IoT work?
- IoT Attacks
- IoT Hacking Methodology
- IoT Penetration Testing
Module 19: Cloud Computing
- Introduction to cloud computing
- Cloud Computing-Concepts
- Attacks
- Methodologies
- Tools
- Countermeasures
- Cloud Penetration Testing
Module 20: Cryptography
- Cryptography concepts
- Types of cryptography
- Encryption algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Cryptanalysis
- Cryptanalysis methods
- Cryptanalysis tools
- Countermeasures
Training Pedagogy
- An advanced practical skill-set in securing laptops, desktops and mobile devices.
- Start a career in cyber security. Become a cyber security expert.
- The very latest up-to-date information and methods.
- You will master the selection and implementation of solid disk encryption technology to protect devices
fully from disk decryption attacks. - We cover all the diverse technologies offered by end-point-protection software; from traditional approaches,
through to next generation and future technology. Covering methods like application control,
execution prevention, machine learning and AI. - How to detect and monitor for threats such as malware and hackers through the use of security through
deception and detection technologies. - How to seek and destroy system resident malware and hackers;
Get up to speed on your hacker hunting! - How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
- We explore the best techniques in anti-forensics to securely delete data and meta-data
so that it is unrecoverable by even computer forensics experts.
Frequently Asked Questions
- This course is for anyone who wants to become an expert in security, privacy, and anonymity.
- For those who want privacy and anonymity online from hackers, corporations and governments.
- For those interested in the latest trends in cyber security and protection of end-points.
The ideal student for this course is technically minded with an interest in how hackers hack,
how trackers track and what you can do to stop them.
Contact for Course
Enrol on Cyber Security course. Every batch starts every Monday.