CS-Know_More

Cyber Security

Eligibility: Students, Professionals who like to pursue career in Cyber Security can opt for it.

Course Objectives: The Cyber Security certification course with DLithe offers hands-on training covering basics, trends, various type of attacks, malwares, ethical hacking, OWASP , Cryptography, Cloud and Security scenarios. The aspirants can learn and implement ethical hacking.

Duration: The course is comprised of Instructor-led 40 hours, with hands-on sessions.

Program Agenda:

Chapter1: Introduction to Information Security

  • What is information security
  • Understanding security

Defining security

  • Current Security Trend
  • Elements of information Security
    • Confidentiality
    • Availability
    • Integrity
    • Authenticity
    • Non Repudiation

Challenges of Securing Information

  • Today’s security attacks
  • Difficulty in defending against attacks Various laws governing information security
    • Health insurance portability and accountability act 1996 (HIPAA)
    • Sarbanes Oxley Act 2002 (SOX)
    • Gramm Leach Bliley Act 1999 (GLB)
    • Payment Card Industry Data Security Standard (PCI-DSS)

Chapter 2: Hacking Introduction

What is Hacking

    • Defining Hacking
    • Hacking Concepts
    • Types of hackers
    • Black Hat
    • White Hat
    • Grey Hat
    • Script Kiddies
    • Hacktivists
    • Cyber Terrorist
    • State Sponsored
    • Defining Ethical Hacking
    • Scope of Ethical Hacking
    • security audits
    • vulnerabilities assessment

Types of Pen Testing

    • Black Box Pen Testing
    • White Box Pen Testing
    • Grey Box Pen Testing

Chapter 3: Introduction to Kali Linux

    • Introduction to Linux File System and Command Line
    • Installing Kali Linux
    • Configure Network Connection
    • Administering Kali Linux
    • Updating and upgrading kali Linux

Chapter 4: Different Phases of Hacking

Foot Printing / Reconnaissance

    • Information Discovery
    • Google hacking/Google Dorks
    • DNS Information Gathering
    • Who. Is Information gathering
    • Email Tracking
    • Net craft
    • FOCA
    • Recon-ng
    • Scanning
    • Theharvester
    • Wayback machine
    • Spokeo
    • Checking live host using PING /HPING
    • Checking Open Ports Using NMAP Tool
    • Checking Vulnerable Services Running

Gaining Access

    • Using Various Methods Of Password Cracking
      • Dictionary Attack
      • Brute Force Attack
      • Rainbow Table Attack
      • Hybrid Attack

Maintaining Access

    • Introduction to MALWARES
    • Types Of MALWARES
      • VIRUS
      • TROJAN
      • WORMS
      • ROOT KITS
      • SPYWARE
      • RANSOMEWARE
      • KEYLOGGERS
      • BOTS
      • ADWARES
      • HOAX

Covering Tracks

    • Removing Logs
    • Corrupting O.S
    • Removing Auditing Logs

Chapter 5: Application and Network Based Attacks

Network Based Attacks

    • Denial Of Service
    • Interceptions
    • Poisoning
    • ARP Poisoning
    • DNS Cache Poisoning

Chapter 6: Introduction to OWASP TOP 10

Defining OWASP Top 10

    • Injections :
    • Broken Authentication
    • Sensitive Data Exposure
    • XML External Entities (XXE)
    • Broken Access Control
    • Security Misconfiguration
    • Cross Site Scripting (XSS)
    • Security Deserialization
    • Using Components with Known Vulnerabilities
    • Insufficient Logging and Monitoring

Chapter 7: Cryptography

Cryptography concepts

    • Defining Cryptography
    • Objectives of Cryptography
    • Types Of Cryptography
      • Symmetric Encryption
      • Asymmetric Encryption

Hash Calculator

      • MD5Sum Calculator
      • Advanced Encryption Package
      • BCText Encoder

Introduction to Firewall

    • Working of Firewall
    • Types Of Firewall

Introduction To Honey Pots

    • Working of Honey Pots
    • Types of Honey pots
    • Wire shark
    • Beef
    • Burp Suite
    • Metasploit Framework
    • AirCrack-Ng

Chapter10: Providing Hands On

System Hacking (Windows & Linux)

    • Using Tools Like NMAP ,METASPLOIT FRAMEWORK
    • Extracting Password From SAM Folder
    • Using Rainbow Table To Decode the Password

Obtaining Passwords BY Sniffing Using MAN-IN-THE-MIDDLE ATTACK (MITM)

    • Demonstrating How To Spoof MAC Address
    • Demonstrating How To Spoof IP Address

Hacking Web Servers and Web Application (OWASP TOP 10)

Providing Hands on Various Tools :

    • Nmap
    • Wire shark
    • Beef
    • SET
    • Theharvester
    • Recon-ng
    • FOCA
    • Burp Suite
    • Metasploit Framework
    • Sql map (Sql Injections)
    • Mitmf(Man in the Middle Frame Work)
Open chat
Need help?
Hello
How can we help you?