You are on page 1of 14
Cc @ NATIONAL INITIATIVE FOR ARTIFICIAL INTELLIGENCE & SECURITY NIAIS ft ONLINE Rett OUTLINE Become a Professional CYBER SECURITY GOO ® wwwziais.org | administration@niais.org | 0324 8900930 Cyber Security Course Description: Cybersecurity is a growing industry, and it’s not just about protecting your data anymore. Now you have to protect your company’s intel- lectual property and conduct business in an ethical way that doesn't compromise your privacy or the privacy of others. Tam en Reel em (od om Mn MUA nema Lee aA ATL data is, how it's converted into cash, and how attackers exploit their targets. We'll also talk about cyber security challenges in the indus- try—and how you can prepare yourself for them. The first part of this class will focus on learning the basics of cyber security: threats, vulnerabilities, and risks. We'll cover host-based F-\ae- Col CM-L ANCL UDA Le oh Noa lt- LMCI LAe) Trojan horses in software utilities. We'll also discuss network attacks such as distributed denial of service (DDOS) and botnet - attacks Trainer Profile MR. ABDUL REHMAN | am a software engineer with a strong passion for teach- ial: Mony eX aay ar Nia etd (arom idole (— ae la ee vate and government organizations for the past six years, and am highly dedicated to providing the best possible guidance to my students. | am a Certified Ethi- cal Hacker, Digital Forensics Expert, Cyber Security Con- sultant, and Android Anatomy Expert, and have gained recognition for my expertise in these areas.| always strive to be at the top of my field and to share my knowledge and skills with others. GOO S® wmriais.org | administration COURSE OUTLINE MODULE 1. CYBER SECURITY AWARENESS & Course Introduction bes TU CCH K0) (a) MUL oid ‘ Course Applications 4 Institute/work ethics S Introduction to Cyber Security 4 Objectives bea) ey acec alec oli els ua LACOAMcVelU lM Lae and cyber security ben Late L en SN] 81-16 8Y- (ard A ieee ome celalayre A NM CMO oe ool ai aVm in ecelae- late & Who is a Hacker? MODULE 2. ETHICAL HACKING AS A CAREER 4 Introduction to Ethical Hacking & What is Ethical Hacking be Noel Malo 4 Govt.Laws of Hacking MODULE 3. PENETRATION TESTING 4 What is penetration testing? Malema om) AcoMOl Mm OLatsiae LAO Kolm Aled GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 4. OVERVIEW OF KALI LINUX Pa elUme(9) han) S Exploit methods % The Kali menu and toolbox MODULE 5. PREPARING THE DEVELOPMENT ENVIRONMENT G Installing a virtual machine be laie-lluiarem-laremecelal areola larcm Colum MinleD4 S Installing and configuring Python Kali Linux ‘ Setting up a Box Lab % Kali Linux Overview S Lab Tracking Disable S Linux file system MODULE 6. FOOT-PRINTING AND RECONNAISSANCE & Understanding the Basics of Footprinting and Reconnaissance ‘ What Is Network Footprinting? Wart eet 1114 S Footprinting Methodology S Information Gathered Through Footprinting MODULE 7. BASIC NETWORK CONCEPT EROS ENS c ne manlelel S TCP/IP & UCP eave Lae) 4 Basic Network topologies & Network Design % Internet protocol (ip) Addressing GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 8. SCANNING NETWORKS & Scanning Networks &Enumeration bes DY =t eta YMA aT MN LAO) MeercTAT NT acme) N(e=) 9 6 % Use various scanning tools Pena elmer Ua aN am Ke Munro a Colm UVR CLE ALe] open ports % Perform scanning by using various scanning techniques & Scan beyond intrusion detection system (IDS) Elie AlKnclle ee oa (oma Y= Ua a led) ) 014 % Draw network diagrams using network discovery tools % Perform scanning penetration testing G Describe the enumeration concepts ‘ Explain different techniques for Netbios enumeration beam co aMeN ACR) h Lem Cena (e|6 | CO]MES i es enumeration ce col AMenla (Ke nlem k—CeUnl ae [0a Co) MD) \ cd enumeration ce ele UMAR Lecce (emo Ten ie-1a(e)f) eee UMeliiR- nl meen (CLM aL] DNS enumeration S Explain other enumerations such as IPsec, VoIP, RPC, and Linux/Unix enum bear Vo AU ielaC Mae e mL U Cory & Perform enumeration penetration testing GOO S ria. org | acdministration@riais.org | 0 COURSE OUTLINE MODULE 9. SYSTEM MOBILE HACKING ‘ Describe the Hacking Methodology % Explain different techniques to gain access to iS G Apply privilege escalation techniques G Explain different techniques to create and maintain remote access to the system & Describe different types of rootkits em odo) CUA a=s"t- Ln e)4 = 9)IV-LNLOReorr-UT UI techniques & Apply different techniques to hide the evidence Colon) ce ee la OME CoM a-CeLc Lm Lat aae-1a(laorla ald MODULE 10. MALWARE THREATS & Describe the concepts of malware and malware propagation techniques G Describe the concepts of Trojans, their types, and how they infect systems & Explain the concepts of viruses, their types, and how they infect fi G Explain the concept of computer worms ‘ Perform malware analysis G Explain different techniques to detect malware ee \ eo WAUT-lAn lk mee LUN KALI eK) & Perform malware penetration testing GOO S ria. org | acdministration@riais.org | 0 COURSE OUTLINE MODULE 11. SNIFFING & SESSION HIJACKING peed TARTU AA LN -meCe)n [OL % Explain different MAC attacks ee cele CK 01 OL ee-La LoL & Describe the ARP poisoning & Explain different MAC spoofing tracks 4 Describe the DNS poisoning PAS Miia ilom cele ee No) WAAL AMN MOCO Cla tacr Ucar) 4 Apply various techniques to detect sniffing G Perform sniffing penetration testing MODULE 12. SOCIAL ENGINEERING Pee mam ele Ml oa im xe] 1 % Perform social engineering using various techniques bem seta Mae Tm an es 1 % Perform impersonation on social networking Sie) % Describe identity theft % Apply social engineering countermeasures eNom ClCH NULL RU CMe MC) % Perform social engineering penetration testing GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 13. DENIAL-OF-SERVICE % Describe the DoS/DDoS concepts % Perform DoS/DDOS using various attack techniques % Describe Botnets ‘ Describe DoS/DDOS case studies % Explain different DoS/DDoS attack tools ‘ Apply best practices to mitigate DoS/DDOS attacks & Perform DoS/DDOS penetration testing MODULE 14. EVADING IDS, FIREWALLS, AND HONEYPOTS G Describe IDS, firewall, and honeypot concepts & Use different IDs, firewall and honeypot solutions Explain different techniques to bypass IDS % Explain various techniques to bypass firewalls 4 Use different IDS/firewall evading tools Explain different techniques to detect honeypots % Perform IDS and firewall penetration testing GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 15. HACKING WEB APPLICATIONS & OWASP TOP 10 & Describe web application concepts % Perform various web application attacks \ Describe about web application hacking methodology 4 Use different web application hacking tools % Apply web application attacks countermeasures & Use different web application security testing tools & Perform web application penetration testing S Describe the SQL injection concepts % Perform various types of SQL injection attacks % Describe SQL injection methodology eam ecnlees le Malay eld (elmore) Cy % Explain different IDS evasion techniques % Apply SQL injection countermeasures MODULE 16. HACKING WIRELESS NETWORKS & Describe wireless concepts bee dP) al MAL Ko CM nel ay] La (ela-lCxe a (ant) G Describe wireless threats ‘ Describe wireless hacking methodology pO Mela CN LON NIK CocMm aTeTeL.d alma mele) C3 % Describe Bluetooth hacking techniques bear Ne) 91 NANAK Corm ar-CeLa atm ele neo an acrtSU Koy 4 Use different wireless security tools ana MUMAiK Men ee-laeDmKa ed GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 17. HACKING MOBILE PLATFORMS % Understand various Android threats and attacks be Olalel—iaie-laTe MZ la lel cm Osa nike e-LaTe MLA RCo) ‘ Use various mobile spyware % Describe Mobile Device Management (MDM) % Apply various mobile security countermeasures & Use various mobile security tools & Perform mobile penetration testing MODULE 18. NETWORK SECURITY FUNDAMENTALS & Security Through Network Devices % Standard Network Devices Sela old asa La a a EUK lA LUE) % Security Through Network Technologies % Network Address Translation (NAT) & Network Access Control (NAC) % Security Through Network Design Elements & Demilitarized Zone (DMZ) o Subnetting & Virtual LANs (VLANs) % Remote Access GOOF wwnniais.org | administration@niais.org | 0324 8900930 COURSE OUTLINE MODULE 19. BASH SCRIPTING WS ees Sa Sel La % Running your own Script & Using the Metasploit Framework & Starting Metasploit % Finding Metasploit Modules \ The Module Database % Built-In Search ‘ Setting Module Options MODULE 20. DIGITAL FORENSIC IN CYBER SECURITY & Digital Evidence S Network Traffic investigation beso LANs aiex- 180) G File & Folder Investigation 4 Investigation Report GOOF wwnniais.org | administration@niais.org | 0324 8900930 14 RE Recorded Lectures + Online Zoom Sessions Certification Included Internationally Recognized Course Content Internship Opportunity 100% Practical Approach 100% Affordable Fee 24 Hours Support We teach you step by step from beginner to advance level GOOG wwnniais.org | administration@niais.org | 0324 8900930 oF N14 aor Moaunccukcsta menus : Tsar rig a yp 5 4 aN ATG N= . a ent y @ eye na NN A A ha x 1 aoe tye ee Lea FZ

You might also like