Professional Documents
Culture Documents
IN CYBER DEFENCE
Target Audience
Cybersecurity professionals
Penetration testers
Network administrators
Applications security personnel
Information security architects
Governance staff
MODULE 2
CYBER ATTACKS
Cyber attacks include eavesdropping, replay attacks, man-in-the-middle, session hijacking,
drive-by downloads, DDoS, DNS spoofing, ARP spoofing, wireless attacks, social
engineering, masquerading, side-channel attacks, pass-the-hash, Kerberos exploitation,
elevation of privilege, typo squatting, and zero-day attacks. Stay vigilant to ensure digital
security.
MODULE 3
NETWORK SECURITY
Network security involves various key elements for safeguarding data and systems. The
OSI layers facilitate communication between devices. Secure protocols like TLS, HTTPS,
SSH, SFTP, DNSSEC, S/MIME, SMTPS, POP3S, and IMAPS ensure encrypted and
authenticated data transfer. AAA protocols like RADIUS, TACACS+, and Active Directory
handle authentication and authorization. EAP, WPA2, and WPA3 enhance wireless security,
while VPN enables secure remote connections. Virtual LAN (VLAN) and network
segmentation isolate and organize network traffic. Zero Trust Architecture ensures strict
access controls. Proxy devices, content filters, and port security fortify network defenses.
Single Sign-On and Federated Identity simplify user authentication. Network Access
Control (NAC) verifies and manages device access.
MODULE 5
MODULE 6
INFORMATION GATHERING
Information gathering in cybersecurity involves various techniques. Open-Source
Intelligence (OSINT) gathers data from publicly available sources. Google Hacking or
Google Dorking leverages specific search queries to uncover sensitive information.
Recon-ng and theHarvester are tools for automated information gathering. Packet sniffing
using Wireshark captures network data for analysis and assessment.
MODULE 7
VULNERABILITY SCANNING
Vulnerability scanning is crucial for detecting weaknesses in systems. It includes credential
and non-credential scans to assess security levels. Various scanning types, such as Nmap,
Nessus, OpenVAS, Nikto, Arachni, Metasploit, and SQLmap, are employed to identify
vulnerabilities effectively.
MODULE 9
EXPLOITATION
Exploitation involves various hacking techniques. Password cracking methods, like John
The Ripper, Hydra, and Rainbow Table Cracking, uncover weak passwords. System hacking
targets computer systems, while web application hacking exploits vulnerabilities in web
apps. Wireless networks can be exploited, and methods to evade IDS, IPS, and firewalls are
used to bypass security measures.
MODULE 10
POST EXPLOITATION
Post exploitation techniques are used after gaining unauthorized access. Deep Packet
Inspection analyzes network traffic deeply. Malware analysis includes Static Analysis and
Dynamic Analysis to understand malicious code. Process and network monitoring help
track system activities. Network pivoting is used to move laterally through the network.
Privilege escalation aims to gain higher access levels.
MODULE 11
CONDUCTING ATTACKS
Conducting attacks involves various methods. DoS & DDoS attacks overwhelm systems to
disrupt services. Social engineering tricks people into divulging sensitive information.
Steganography hides data within innocuous files to evade detection.
CRYPTOGRAPHY
Cryptography is essential for secure communication. Basic terms include Cryptography,
Cryptanalysis, Cryptosystem, Encryption, Decryption, Algorithm, Key, Plaintext,
Ciphertext, and Work Factor. Classical Cryptography uses traditional methods, while
Symmetric Cryptography uses the same key for encryption and decryption. Asymmetric
Cryptography uses different keys, and Hash Functions, HMAC ensure data integrity.
Digital signatures validate authenticity. Public Key Infrastructure (PKI) manages
cryptographic keys and certificates.
MODULE 13
MODULE 14
MODULE 15
MODULE 16
PREVENTIVE MEASURES
Preventive measures are essential for robust cybersecurity. Harden information assets to
strengthen their defenses. Create blacklists to block malicious content and whitelists to
allow trusted sources. Implement anti-malware solutions to detect and prevent malware.
Use honeypots and honeynets to lure attackers away from real assets. Employ auditing,
logging, and monitoring to track and analyze system activities for early detection of
threats. Practice privileged account management to restrict access and reduce potential
risks. Understand false positive, false negative, true positive, and true negative to refine
security measures.
MODULE 18
FIREWALL MANAGEMENT
Firewall management is vital for network security. Firewalls act as barriers between trusted
and untrusted networks, controlling traffic based on rules. There are hardware and
software firewalls. Creating and updating firewall rules involves defining criteria to allow or
block specific traffic, adapting to changing security needs.
MODULE 19
MODULE 21
SPLUNK
Splunk is a powerful data analytics and monitoring platform used for capturing, indexing,
and searching machine-generated data from various sources. Its architecture involves
Splunk Enterprise and Forwarder installations, which collect and index data for analysis.
Data indexing enables efficient searching and visualization of information. Users can create
alerts and reports to monitor specific events and patterns. Splunk is widely used in various
use cases to analyze logs and gain valuable insights from machine-generated data.
MODULE 22
INCIDENT RESPONSE
Incident Response is crucial for cybersecurity. Events and Incidents are distinguished
based on their impact. Incident Management follows four stages: Preparation, Detection,
Response, and Recovery. Automating Incident Response using SOAR and UEBA
streamlines and improves the efficiency of handling security incidents.
MODULE 23
SECURITY FORENSICS
Security investigations are essential to identify, analyze, and respond to cybersecurity
incidents effectively. Types of security investigations include digital forensics, network
forensics, and malware analysis. The stages of security forensics involve identification,
preservation, analysis, and reporting of evidence. Security forensics principles include
maintaining integrity, confidentiality, and chain of custody while conducting investigations.
COMPLIANCE MANAGEMENT
Compliance management is crucial for meeting security standards and legal requirements.
It involves ensuring adherence to policies, laws, and regulations and generating compliance
metrics and reports. Relevant parties are notified of any deviations, and evidence is
available for analysis and presentation. Security laws cover computer crimes and privacy
laws like GDPR and HIPAA. Intellectual property laws protect copyrights, patents, and
trademarks. Industry standards include ISO 27000, PCI DSS, and SSAE18 (SOC) for
maintaining a secure and compliant environment.
Part 3
MODULE 26
MODULE 28
MODULE 29
MODULE 30
MODULE 31
Part 4
Certified Penetration Testing Professional
(CPENT - Official Training Only)
MODULE 33
MODULE 34
MODULE 35
MODULE 37
MODULE 38
MODULE 39
MODULE 40
MODULE 42
MODULE 43
MODULE 44
MODULE 45
MODULE 46
MODULE 47
MODULE 48
SCANNING NETWORKS
Scanning Networks: Learn Network Scanning Concepts, Tools, and Techniques. Go beyond
IDS and Firewall with Banner Grabbing. Create Network Diagrams and apply Scanning in
Pen Testing for comprehensive network assessment.
MODULE 49
ENUMERATION
Enumeration: Understand Enumeration Concepts. Explore NetBIOS, SNMP, LDAP, NTP,
SMTP, and DNS Enumeration. Learn Countermeasures and Other Enumeration
Techniques. Apply Enumeration in Pen Testing for thorough assessment.
VULNERABILITY ANALYSIS
Vulnerability Analysis: Grasp Vulnerability Assessment Concepts. Explore Solutions, Scoring
Systems, and Tools. Learn to generate effective Vulnerability Assessment Reports for
comprehensive security evaluation.
MODULE 51
SYSTEM HACKING
System Hacking: Understand System Hacking Concepts. Learn Password Cracking, Privilege
Escalation, Application Execution, File Hiding, and Covering Tracks techniques. Apply
Penetration Testing for robust system security assessment.
MODULE 52
MALWARE THREATS
Malware Threats: Grasp Vulnerability Assessment Concepts. Explore Solutions, Scoring
Systems, and Tools for Vulnerability Assessment. Learn to generate effective Vulnerability
Assessment Reports for thorough security evaluation
MODULE 53
SNIFFING
Sniffing: Understand Sniffing Concepts. Explore MAC Attacks, DHCP Attacks, ARP Poisoning,
Spoofing, and DNS Poisoning techniques. Learn Sniffing Tools and Countermeasures. Grasp
Sniffing Detection Techniques. Apply Sniffing in Pen Testing for thorough security assessment.
MODULE 54
SOCIAL ENGINEERING
Social Engineering: Understand Social Engineering Concepts and Techniques, including Insider
Threats, Impersonation on Social Networking Sites, and Identity Theft. Learn
Countermeasures and apply Social Engineering in Penetration Testing for comprehensive
security assessment.
DENIAL-OF-SERVICE
Denial-of-Service: Grasp DoS/DDoS Concepts. Learn Attack Techniques and Botnets. Study
DDoS Case. Explore Attack Tools and Countermeasures. Understand Protection Tools and
apply DoS/DDoS Attack in Penetration Testing for robust assessment.
MODULE 56
SESSION HIJACKING
Session Hijacking: Understand Session Hijacking Concepts, including Application-Level and
Network-Level techniques. Explore Session Hijacking Tools and Countermeasures. Apply
Session Hijacking in Penetration Testing for comprehensive security assessment.
MODULE 57
MODULE 58
MODULE 59
SQL INJECTION
SQL Injection: Learn Web App Concepts and Threats. Explore Hacking Methodology and
Tools. Understand Countermeasures and use Web App Security Testing Tools. Apply SQL
Injection in Pen Testing. Understand SQL Injection Concepts, Types, Methodology, and Tools.
Explore Evasion Techniques and Countermeasures for comprehensive security assessment.
MODULE 61
MODULE 62
MODULE 63
IOT HACKING
IoT Hacking: Grasp IoT Concepts and Attacks. Explore Hacking Methodology and Tools.
Understand Countermeasures and use IoT Pen Testing for comprehensive security
assessment.
MODULE 64
CLOUD COMPUTING
Cloud Computing: Understand Cloud Computing Concepts and Threats. Explore Cloud
Attacks and Cloud Security. Learn about Cloud Security Tools and apply Cloud Penetration
Testing for robust assessment.
CRYPTOGRAPHY
Cryptography: Grasp Cryptography Concepts and Encryption Algorithms. Explore
Cryptography Tools, PKI, Email Encryption, Disk Encryption, and Cryptanalysis. Understand
Countermeasures for effective cryptographic security.
Part 6
INTRODUCTION TO ISMS
Introduction to ISMS: Learn ISMS Objectives and Definitions. Understand Information,
Information Security, Confidentiality, Integrity, and Availability. Explore Security Controls and
grasp the concept of Information Security Management System (ISMS).
MODULE 67
MODULE 68
MODULE 70
MODULE 71
MODULE 72
MODULE 73
CSA
CPENT
Safeguarding enterprise security with foolproof security strategies, tools, and best practices
Enhancing organizational security with cyber Kill Chain and Offensive Security practices
Blue teaming to identify, evaluate existing security architecture and develop remedial plans
Setting up cyber Security Operation Center (SOC) to observe organizational cyber defence
Implementing Python based functions for malware analysis, security structure scanning, and
pentesting
“
With heartfelt gratitude, I'm
currently enrolled in the
Advanced Diploma in Cyber
Defense (ADCD) course at Red
“ My name is Mishal, and I am
proud to be a student at
RedTeam Hacker Academy in
“ ADCD is a well-crafted,
comprehensive training and
certification course. gaining
Team Hacker Academy, and I'm Calicut. Currently enrolled in good knowledge of
thoroughly impressed by its the ADCD Course and having networking. This course has
enlightening, well-structured recently completed the CEH both an offensive and
content, the instructor's certification.I am truly grateful defensive side. and
expertise in simplifying complex for the opportunity to learn well-trained trainers too. This
concepts through relatable from top-class courses course is helpful for
examples, the valuable hands-on provided by RedTeam Hacker professionals to evolve into
labs that reinforce Academy. I must commend the cybersecurity.
comprehension and confidence, trainers at the academy for
and the engaging, interactive their exceptional dedication.
teaching style that encourages They are not only highly
discussions and approachable knowledgeable in their fields
instructor interaction. but also incredibly friendly and
approachable.
Happy Student
h t p s : / w . m a n o r m a n l i e . c o m / d i s t r c - n e w s / m a l p u r a m / 2 0 3 5 / 0 8 m a l p u r a m -2 5 l a k h - r e w a d - f o r p i n t g - o u t h e - s c u r i t y - l a p s e . m h t l
READ MORE
htps:/w.madhy .com/tehnlgyews/u-25lakhtogul-whpointed-uhglitc-nhewbsit-15798?infitescrol=1
htps:/w .madhyma .com/technolgy/newsu-25lakh-togkul-whopinted-out he-glitch-nte-wbsite-157981?infi tescrol=1
READ MORE
h t p s : / w . t w e n y f o u r n e w s . c o m / 2 0 3 / 5 0 4 / c y b e r s c u r i t y - s u d e n t - g o k u l - s d h a k r - w i n s -2 5 l a k h s - b u g o u n t y - r e w a d . h t m l
READ MORE
BROADCAST MEDIA
ht ps:/ yout .be/TbR4Peqm3QI htps:/maly .news18com/videsbuz/rwad-ofs25lakh-toesudnt-whopinted-uhsecrity-bachnte-wbsijk-6027.html
PANEL DISCUSSION
2019
2019
2021
2021
h t p s : / y o u t . b e / L zK WhU W O q MY
2023
2023
PANEL DISCUSSION
DUBAI
"We can only refer students who demonstrate a strong commitment to learning and
show consistent progress throughout the course. We are unable to assist students
who lack the motivation to help themselves."
https://redteamacademy.com/
www.redteamacademy.com
htps:/w .instagr m.com/redt am cademy/ htps:/w .facebo k.com/redt am cademy htps:/twi er.com/iflow/lgin?redi ct_afer_login=%2Fredtamcdemy htps:/in.l kedin.com/company/redt am cademy htps:/w .yout be.com/@redtamhckeracdemy
Hack Out
Your Career
RedTeam Hacker Academy Pvt. Ltd.
An ISO 9001 - 2015 Certified Company
Contact
h t p s : / r e d t e a m a c a d e m y. a e / h t p s : / r e d t e a m a c a d e m y. c o m / h t p s : / r e d t e a m t r i v a n d r u m . c o m / h t p s : / r e d t e a m t h r i s u r. c o m /
DUBAI CALICUT TRIVANDRUM THRISSUR
O307, Third Floor, Fourth Floor, C.M Mathew 2nd Floor, Athens Plaza, SS Kovil 3rd Floor Puthenpurackal Tower,
Hamsa Building, Above Ansar Brothers Arcade, Kannur Rd, Road, Near Apollo Dimora, Opposite Civil Lane Road, Westfort, Thrissur,
Gallery, Al Karama, Khalid Bin Al Above CSB Bank, West Central Railway Station, Thampanoor,
Waleed Rd, Burjuman Metro Nadakkave, Chakkorathukulam,
Kerala 680004
Thiruvananthapuram,Kerala 695001
Station Exit #2 Dubai Kozhikode, Kerala 673011
+91 956 219 5666 +91 813 784 3966
+971 52 447 9899 +91 956 250 3666