Cyber Security Course
Cyber Security is becoming an increasingly important issue for businesses across the globe. Recent research from cybersecurity experts indicates that there will be a significant increase in demand for cybersecurity professionals
over the next five years.
Introduction
- Hackers & Hacking Methodologies
- Footprinting
- Scanning
- Enumeration
- Escalation of privilege
- Covering tracks
- Types of hackers
- Cyber Security threats
- Computer security
- Layer of security
- Fundamental concepts of Security
- Footprinting Threats
- Methods of Footprinting
- Using Search Engines
- Financial Services and Information Gathering
- Job Sites
- Working with Email
- Social Engineering
- Google Hacking Technique
- Google Advanced Search Operators
- Types of Scans
- NMAP Tool
- OS Fingerprinting
- Checking the Status of Ports
- Banner Grabbing
- Using Proxies
- Enumeration
- Password-Cracking Techniques
- Types of Password Attacks
- Offline Attacks
- Keylogger and AntiKeyloggers
- Spyware and Antispyware
- Steganography Techniques
- What is Encryption, Data Encryption
- Encryption Standards
- DES, AES, RSA
- md5, SHA-1, SHA-2
- Digital Certificates
- Working of Digital Certificates
- Digital Signature
- Cryptography Tools
- Data Backup, Online Data backup
- Types of backup
- Raid 0, Raid 1, Raid 5
- Data backup and restore
- Data recovery
- Online Gaming Risks
- Child Online Safety
- SSL/TLS
- Guidelines for Internet Security
- Internet Security Laws
- Home Network
- Create Wireless Network
- Create an access point
- Network Security Threats
- Setting up a Wireless Network
- Secure Network Connections
- General Security Practices in Home Networking
- Network firewall
- IDSandIPS
- VPN
- Create inbound and outbound traffic policies
- Email Security and Threats
- Online Email Encryption Service
- Identity Theft and Guidelines for identity theft Protection
- Mobile Device Security
- Mobile Malware and Anti-Virus