Professional Documents
Culture Documents
Content
Cybersecurity
Network security is critical for protecting sensitive data and
systems from cyber attacks and other security threats.
CHAPTER 1 :
NETWORK
Network security involves a variety of
technologies, policies, and practices
designed to prevent or mitigate the
risks associated with cyber attacks,
malware, and other security threats.
Content
- What is Network
- Network Devices
- Network Architecture
- Servers
- IPv4 & Subnetting
- MAC Address
- ARP & RARP
- OSI Model
- TCP/IP
- Firewall and IDS/IPS
- Intro to routing & Switching
- STP & DHCP & DNS Main concept
Chapter 2 :
Ethical Hacking
Content
- What is cybersecurity ?
- Jobs in cybersecurity
- What is hacking & Cracking
- Hackers Types
- Hacking Proccess
- Enumration
- Intro to malwares
- Virus & Worms
- Trojen
- Botnet
- Spyware
- Ransomware
- Social Engineering
- Reverse Engineering
- Kali Linux Basics
- and more !!!
NOVEL ACADEMY
Content
- Introduction to Wireless Networks
- Wireless Standards and Protocols
- Wireless Network Components
- Wireless Network Security (Antena - SSID -
BSSID - WEP - WEP Cracking )
- Evil Twin Attack
<BASH>
Content
What is BASH
BASH Scripting
( Printing - var - if - looping - set -
functions )
Sign in page by BASH ( Practical )
Automate Gathering information
Script ( Practical )
and more
NOVEL ACADMEY
INTERNET OF THINGS
Content
- Intro to IoT
- IoT Security
- IoT Pentesting
CLOUD
Content
- Introduction to Cloud Computing
- Cloud Security
- Cloud Service Models
- Cloud Deployment Models
- Cloud Penetration Testing & Tools
Novel Academy
Content
What is VPN
What is Proxy
What is Tor & Dark web
Go into Dark Web Websites
What is password cracking
What is Brute force & Wordlist
What is Dictionary attack
what is John The Ripper
Crack Password Using John The Ripper
What is steganography
steganography uses & technology
Hide file into photo
NOVEL ACADEMY
Online Security Diploma
Content
"An Introduction to Security Operations Centers (SOCs)"
"Understanding the Role and Importance of SOC in Cybersecurity"
"What is a SOC and Why Do We Need It?"
"The Evolution of SOC: From Reactive to Proactive Security Operations"
"The Benefits of Having a SOC: Improved Threat Detection and Response"
Defensive technics
Network defense