You are on page 1of 23

Diploma

Content
Cybersecurity
Network security is critical for protecting sensitive data and
systems from cyber attacks and other security threats.

CHAPTER 1 :
NETWORK
Network security involves a variety of
technologies, policies, and practices
designed to prevent or mitigate the
risks associated with cyber attacks,
malware, and other security threats.
Content
- What is Network
- Network Devices
- Network Architecture
- Servers
- IPv4 & Subnetting
- MAC Address
- ARP & RARP
- OSI Model
- TCP/IP
- Firewall and IDS/IPS
- Intro to routing & Switching
- STP & DHCP & DNS Main concept

Novel Academy CYBERSECURITY DIPLOMA


Novel Academy

Chapter 2 :
Ethical Hacking
Content
- What is cybersecurity ?
- Jobs in cybersecurity
- What is hacking & Cracking
- Hackers Types
- Hacking Proccess
- Enumration
- Intro to malwares
- Virus & Worms
- Trojen
- Botnet
- Spyware
- Ransomware
- Social Engineering
- Reverse Engineering
- Kali Linux Basics
- and more !!!

Novel Academy CYBERSECURITY DIPLOMA


Content
- Introduction to Footprinting and
Reconnaissance
- Information Gathering Techniques
- Footprinting Methodology
- Footprinting Tools
- Email Tracking
- Introduction to Enumeration
- Types of Enumeration
- Network Enumeration
- DNS Enumeration
- SNMP Enumeration

Novel Academy CYBERSECURITY DIPLOMA


Chapter 5 :
Offensive Attacks
Novel Acadmey
Content
- DDOS vs DOS
- SQL injection
- MITM
- Watering hole & Data Leakge
- Session Hijacking
- Cross-Site Scripting (XSS)
- XEE
- Brute Force Attacks
- ARP Poisoning
- DNS Spoofing
- DHCP Starvation
- STP Manipulation
- Juice Jacking
- Buffer overflow
- Sub domian Takeover
- and moreee !

Novel Academy CYBERSECURITY DIPLOMA


CHAPTER 6 :
CRYPTOGRAPHY
Novel Academy
Content
- Introduction to Cryptography
- Symmetric Cryptography
- Intro to AES
- Asymmetric Cryptography
- Intro to RSA
- Hashing
- Intro to MD5
- Cryptographic Attacks
- and more

Novel Academy CYBERSECURITY DIPLOMA


Chapter 7 :
Wireless Hacking

NOVEL ACADEMY
Content
- Introduction to Wireless Networks
- Wireless Standards and Protocols
- Wireless Network Components
- Wireless Network Security (Antena - SSID -
BSSID - WEP - WEP Cracking )
- Evil Twin Attack

Novel Academy CYBERSECURITY DIPLOMA


CHAPTER 8 :
BASH SCRIPTING
</Novel_Academy>

<BASH>
Content
What is BASH
BASH Scripting
( Printing - var - if - looping - set -
functions )
Sign in page by BASH ( Practical )
Automate Gathering information
Script ( Practical )
and more

Novel Academy CYBERSECURITY DIPLOMA


HA
IO
T
CHAPTER 9 :
IOT HACKING
CK
ED
!

NOVEL ACADMEY
INTERNET OF THINGS
Content
- Intro to IoT
- IoT Security
- IoT Pentesting

Novel Academy CYBERSECURITY DIPLOMA


CHAPTER 10 :
CLOUD COMPUTING
Novel Academy

CLOUD
Content
- Introduction to Cloud Computing
- Cloud Security
- Cloud Service Models
- Cloud Deployment Models
- Cloud Penetration Testing & Tools

Novel Academy CYBERSECURITY DIPLOMA


Chapter 11 :
Uncovering Secrets

1. Password cracking is the act of guessing or breaking a password to gain


unauthorized access to a system or account.
2. The Dark Web is a hidden part of the internet where cybercriminals can buy and
sell stolen data, including passwords.
3. Cryptography, including steganography, is often used to protect passwords and
other sensitive information from being intercepted or stolen by malicious actors
on the Dark Web.

Novel Academy
Content
What is VPN
What is Proxy
What is Tor & Dark web
Go into Dark Web Websites
What is password cracking
What is Brute force & Wordlist
What is Dictionary attack
what is John The Ripper
Crack Password Using John The Ripper
What is steganography
steganography uses & technology
Hide file into photo

Novel Academy CYBERSECURITY DIPLOMA


Chapter 12 :
Intro to SOC
( Security Operation Center )

NOVEL ACADEMY
Online Security Diploma
Content
"An Introduction to Security Operations Centers (SOCs)"
"Understanding the Role and Importance of SOC in Cybersecurity"
"What is a SOC and Why Do We Need It?"
"The Evolution of SOC: From Reactive to Proactive Security Operations"
"The Benefits of Having a SOC: Improved Threat Detection and Response"
Defensive technics
Network defense

Novel Academy CYBERSECURITY DIPLOMA

You might also like