CYBER SECURITY CERTIFICATION COURSE
Course Description
The Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations. Enroll in this Cyber Security certification training program to learn from experienced industry professionals, work on real-time projects and become a certified expert.
HACK YOUR
#FUTURE
Build cybersecurity skills to accelerate your career
COURSE STARTS IN
Contact Us
We will get back to you as soon as possible.
Please try again later.
Cyber Security Course Curriculum
-
Introduction to Cyber security & Ethical Hacking
Learning Objective: In this Cyber security training online module, you will learn about the essential building blocks and basic concepts around cybersecurity such as Confidentiality, Integrity, Availability, Security Architecture, Security Policies, and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture.
Topics:
- Need of Cybersecurity
- CIA Triad
- Security Architecture
- Security Governance
- Security Auditing
- Regulations & Frameworks
- Ethical Hacking
- Types of Hackers
- Phases of Ethical Hacking
- Penetration Testing
- Types of Penetration Testing
- Footprinting
- Objectives of Footprinting
- Types of Footprinting
- Footprinting Techniques
Hands-On/Demo:
- Footprinting a website using Whois Lookup, netcraft, and shodan
- Gathering information about Domain through Reon-ng Tool in Kali Linux
- Gathering information about Domain through Maltego Tool
- Gathering information about Sub-domain through Sublist3r and dnsmap tool in Kali linux
- Email Footprinting using eMail Tracker Pro
- DNS Footprinting using DNS Interrogation Tools
-
Cryptography
Learning Objective: In this cyber security courses online module, you will learn various forms of cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods, and its usage are employed in the enterprise to store and transmit messages safely.
Topics:
- Types of cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Hash functions
- Digital signatures
- Public Key Infrastructure (PKI)
- Attacks on cryptosystems
Hands-On/Demo:
- Generating and identifying hashes
- Signing a file with digital signatures
-
Computer Networks & Security
Learning Objective: In this cyber security learning module, you will glance over various aspects related to computer networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks.
Topics:
Followings are the topics you will be having in this Cyber security course program:
- Introduction to Computer Network
- Computer Networks - Architecture
- Layered architecture
- Open Systems Interconnect (OSI) Model
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Network Scanning
- Enumeration
- Common Network Threats/Attacks
Hands-On/Demo:
- Identify the Network Routes in the System
- DNS lookup and reverse lookup
- Network Path tracing
- Network Analysis
- Network scanning
- Enumeration
-
Application and Web Security
Learning Objective: We offer the best cyber security courses online so that you can learn the importance of Application-level security. You will also explore various known application weaknesses, techniques to attack them, and various controls/solutions to these vulnerabilities. You will also get an overview of countermeasures that can be employed to protect from different threats.
Topics:
- Web server architecture
- Web server attacks
- Countermeasures and patch management
- Web application architecture
- Web application attacks
Hands-On/Demo:
- Capturing session ID with Burp Suite
- Local File Inclusion on bWAPP
-
IdAM (Identity and Access Management)
Learning Objective: In Edureka's best cyber security certification course module, you will learn about the aspects related to the principle of Identity & Access Management. This module covers various intricacies around concepts of authorization, authentication, identity & access management, and its benefits to an enterprise.
Topics:
- Authentication and authorization
- Authentication and authorization principles
- Regulation of access
- Access administration
- IdAM
- Password protection
- Identity theft
Hands-On/Demo:
- Adding and granting permissions to users in Linux
- Identifying phishing websites
-
Vulnerability Analysis & System Hacking
Learning Objective: In this cyber security certification course module you will learn how to analyze a system for various vulnerabilities. You will also learn various strategies and methodologies to gain access to the system.
Topics:
The following topics you will be having in this cybersecurity course module:
- Vulnerability Analysis
- Types of Vulnerability Analysis
- Vulnerability Assessment Lifecycle
- Vulnerability Assessment Tools
- Vulnerability Scoring Systems
- Vulnerability Assessments Report
- System Hacking
- Password Cracking
- Privilege escalation
- Executing Applications
- Hiding Files
- Clearing Logs
Hands-On/Demo:
- Find the vulnerabilities of the host/website using the Nessus tool
- Find the vulnerabilites on target website/ host using Nikto scanner
- Password Breaking – Ophcrack
- Password Breaking - Konboot Tool
- Install keyloggers and configure the victim PC to monitor the system on keystrokes and screenshots
-
Sniffing and SQL Injection
Learning Objective: In Edureka's best cyber security courses online module, you will learn the concept of malwares, its propagation techniques, its types, concept of sniffing, types of sniffing attacks, SQL injection & its types, and SQL injection methodologies.
Topics:
- Malware and its propagation ways
- Malware components
- Types of malware
- Concept of sniffing
- Types of sniffing
- Types of sniffing attacks
- SQL injection
- Types of SQL injection
- SQL injection Methodologies
Hands-On/Demo:
- Create a trojan by using msfvenom
- Sniff network packets Using Wireshark
- MAC Flooding Using macof
- DHCP attack using Yersinia
- Bypass Authentication using SQL Injection
- Determine how the hackers may get the database of a website and steal the credentials of users from website vulnerability
-
DoS and Session Hijacking
Learning Objective: In this Cybersecurity training online module, you will gain an overview of DoS and DDoS attacks, session hijacking and its types, working of the intrusion detection system, and the concept of honeypots.
Topics:
Followings are the topics you will be having in this Cyber security course program:
- DoS attack
- DDoS attack
- Common symptoms of DoS/DDoS attack
- Categories of DoS/DDoS Attack Vectors
- DoS/DDoS detection techniques
- Session hijacking
- Application level session hijacking
- Network level session hijacking
- Intrusion Detection System (IDS)
- Types of Intrusion Detection Systems
- Introduction to Firewalls
- Types of Firewalls
- Introduction to Honeypots
- Evading IDS
Hands-On/Demo:
- DoS Attack using LOIC Tool
- Cross-site Scripting attack
- Demonstration on cookie stealing
FAQS
Here are answers to some common questions.
-
What is the Course fee?
Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links. -
Can I get a full refund?
Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links. -
What is the delivery method?
Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links. -
What is the training schedule?
Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links. -
Are the instructors well trained?
Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.
Talk to us today!
We will get back to you as soon as possible
Please try again later
Our clients have so many great things to say.
With over ten years in the business, we know what you need to have the best possible experience.
“Your platform is so easy to use. Thank you!”
Michel D
“Your platform is so easy to use. Thank you!”
Michel D
“Your platform is so easy to use. Thank you!”
Michel D