Introduction to Cybersecurity |
- Well-known cyber attacks
- Cybersecurity ethics and laws
- Cybersecurity standards
|
Networking Fundamentals |
- Understanding network communication
- Setting up networks
- Networking standards
- Network protocols and ports
|
Introduction to Ethical Hacking |
- Penetration testing
- Hacking phases
- Types of attackers
- Tools and lab setup
- Reconnaissance
- Foot printing
- Scanning
|
Vulnerability Analysis |
- Manual vulnerability analysis
- Automated analysis and tools
|
Sniffing |
- Using tools like WireShark and Burp Suite
|
Cloud Computing |
- Cloud architecture
- Benefits and disadvantages
- Types of cloud
- Cloud bursting
- Cloud providers
|
Malware Analysis |
- Types of malware
- Analyzing unwanted software
- Automated tools
|
Denial of Service |
- What is a DOS attack
- How they are done
- Prevention measures
|
System Hacking |
- Exploits and payloads
- Social engineering
- Password attacks
- Brute forcing
- Client-side exploitation
- Post exploitation
|
Incidence Response |
- Steps to take during an attack
|
Reporting |
- Executive summary
- Technical report
|