Course Duration in Hours
180
180
*Learning Methodology : Scenario-based learning (SBL)
*Complete Cyber Security Engineering Course
1>Linux essentials for hackers – (How a Hacker setup his machine)
Module 1:- Linux distribution for hacking (Understanding of operating systems).
Module 2:- Ubuntu – Hacker setup and configuration.
Module 3:- Kali Linux and Parrot OS – Deployment, configuration real time usage.
Module 4:- Upgrades and Linux defense.
2>Ethical Hacking (VAPT)
Course Modules:-
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
3>Anonymity And Privacy (How A Hacker lives his life on the internet)
Module 1- Anonymous Browsing & Tor Network.
Module 2- Anonymous Hosting & Email services.
Module 3- Hidden Communication platforms & Hidden services.
Module 4- Internet Surveillance.
Module 5- Deep web & Dark web.
Module 6- Bypass Mass surveillance and stay Anonymous.
4>Pen testing and Case Studies
- -C&C server and Ransomware attacks (Case Study)
- -Advanced Web application hacking
Module 1 : Security testing in agile world
Module 2 : Penetration Testing Process
Module 3 : Introduction to Web Applications
Module 4 : OWASP TOP 10
Module 5 : Threat modeling
Module 6 : Information Gathering
Module 7 : SQL Injection
Module 8 : SQLi - Filter Evasion and WAF Bypassing
Module 9 : Authentication and Authorization
Module 10 : Cross-Site Scripting & Session Security
Module 11 : Cross-Site Request Forgery
Module 12 : Web Services (APIS)
Module 13 : Report Writing
- -Solutions and configurations
5>Defensive side operation (Whats required to become a Cyber Security Professional)
Module 1- Tool deployment and configuration
Module 2- Includes EDRs (Theory),
Module 3- Threat hunting,
Module 4- SIEM
Module 5- SOC operations (Theory)
Module 6- Security Patch management, Security Patch deployment (Live practical) & automate patch installation.
Module 7- Security Policy making and implementing.
Module 8- Av servers, Firewalls, IDS, IPS Understanding and monitoring techniques
Note :-
You will get the first Question after completing this Course
How can I Hunt Job in Cyber security Domain?
The answer is will help you with Resume writing & Interview preparation.
Course Duration – 6 months
Prerequisites – A+ ,CCNA , MCSA
Freshers can join – Yes
Any work background can join – Yes
Cresent Institute, BTM IInd Stage (Bangalore),Bangalore,IN