Advanced Cyber Security Certification Training

This Cyber Security Advanced Course, will help you boost your journey in Cyber Security filed. This training course aim is to gain good knowledge and become a expertise in Cyber Security. The Advanced Cyber Security Certification program help you to cover all required Cyber Security concepts.

IT & Certification

24 Hours

Description

Cyber Security is a very vast subject where we are covering one type of Cyber security here. i.e : Offensive Cyber Security which means Ethical Hacking. Ethical hacking is a very important issue in today's situation, helping individuals and organizations adopt secure practices and use IT infrastructure. This course starts with basic topics such as networking, network security, and encryption, and discusses various attacks and vulnerabilities and how to protect them. There are hands-on demonstrations that will be useful to the participants. Participants are encouraged to try and reproduce the demonstration experiments described as part of the course.

Course Objectives

The educational objectives of the program are:

To prepare students with the technical knowledge and skills needed to protect and defend computer systems and networks.

To develop graduates that can plan, implement, and monitor cyber security mechanisms to help ensure the protection of information technology assets.

To develop graduates that can identify, analyze, and remediate computer security breaches.

Target Audience

Computer Science and Engineering / Information Technology / Electronics and Communication / Electrical Engineering / Any one who wants to create the career in side Cyber Security

Basic Understanding

Basic concepts in programming and networking

Course Content

No sessions available.

Simpliv Logo
Simpliv LLC
39658 Mission Boulevard,
Fremont, CA 94539, USA

Advanced Cyber Security Certification Training

Session 1: Basic concepts in programming and networking

  1. Introduction to Ethical Hacking
  2. Basic Concepts of Networking (part-l)
  3. Basic Concepts of Networking (part-l I)
  4. TCP/IP Protocol Stack (part-l)
  5. TCP/IP Protocol Stack (Part-lI)
  6. IP addressing and routing (Part I)
  7. IP addressing and routing (Part II)
  8. TCP and UDP (Part I)
  9. TCP and UDP (Part II)
  10. IP subnetting
  11. Routing protocols (Part I)
  12. Routing protocols (Part II)
  13. Routing protocols (Part III)
  14. IP version 6
  15. Routing examples

Session 2: CREATING LAB FOR SYSTEM HACKING

  1. Demonstration Part I
  2. Demonstration Part II
  3. Demonstration Part III
  4. Nessus Installation
  5. How to use nessus
  6. Metasploit Exploiting System Software -1
  7. Metasploit Exploiting System Software - II
  8. Metasploit Exploiting System Software and Privilege
  9. Metasploit Social Eng Attack
  10. MITM (Man in The middle)Attack
  11. Basic concepts of cryptography
  12. Private-key cryptography (Part I)
  13. Private-key cryptography (Part II)
  14. Public-key cryptography (Part I)
  15. Public-key cryptography (Part II)

Session 3: DIFFERENT TYPES OF ATTACKS

  1. Cryptographic hash functions (Part I)
  2. Cryptographic hash functions (Part II)
  3. Digital signature and certificate
  4. Applications (Part I)
  5. Applications (Part II)
  6. Steganography
  7. Biometrics
  8. Network Based Attacks (Part I)
  9. Network Based Attacks (Part II)
  10. DNS and Email Security
  11. Password cracking
  12. Phishing attack
  13. Maloeware

Session 4: DIFFERENT TYPES OF ATTACKS - ||

  1. Wifi hacking
  2. Dos and DDos attack
  3. Elements of Hardware Security
  4. Side Channel Attacks (Part I)
  5. Side Channel Attacks (Part II)
  6. Physical Unclonable Function
  7. Hardware Trojan
  8. Web Application Vulnerability Scanning
  9. Part 1 : SQL Injection Authentication Bypass
  10. Part 2: SQL Injection Error Based
  11. Part 3 : SQL Injection Error Based from Web Application
  12. SQLMAP
  13. Cross Site Scripting
  14. File Upload Vulnerability
  15. The NMAP Tool: A Relook (Part I)
  16. The NMAP Tool: A Relook (Part II)
  17. The NMAP Tool: A Relook (Part III)
  18. Network Analysis using Wireshark
  19. Summarization of the Course
  20. Doubt Session

Coupons

No offers available at this time.

Live Support

Call

+510-849-6155

Mail to

support@simplivlearning.com

Similar Courses

Our Trusted Clients