About Cyber Security Course
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
Course Duration 4 Months
Daily Time 2 Hours
Why Cyber Security?
01
Increasing cybercrimes
02
Use of more IoT devices
03
Increasing technology usage
04
The deep web and cryptocurrency
05
Evolving ransomware cyber attacks
Why Cyber Security in RNW?
- An organization trusted by parents and students for over 15 years.
- Live Training by subject expert teachers. From someone working in the industry.
- All facility of spacious lab and practical.
- job Support
- Up to 5 years of support liability.
100,000+
Career Awareness Counselling
40,000+
Passout Students
100%
Placed Students
1500+
Companies Tie-Ups
Course Curriculum
Introduction
- Introduction to Information Security
- Introduction to Cyber Security
- The CIA Triad
- Introduction to Hacking and Hackers
- Types of Hackers
- Information Warfare
- Need for Ethical Hackers
- Careers in Ethical Hacking
- General Terminologies
- How to become an Ethical Hacker
Basics and Environment Setup
- Cyber Security vs. Ethical Hacking
- Ethical Hacking Laws and Policies
- Software/Hardware Requirements for Hacking Lab
- Installation and Configuration of VMWare
- Dual Boot vs Virtual Machine
- Installing Kali in Virtual Machine
- Managing Network Interfaces
- Download and installation of DVWA and BWAPP
- Installing Metasploitable
- Installing OWASP Broken Web Application
Linux
- Introduction to Command Line
- File Systems
- User Hierarchy
- Terminal and shell commands
Networking
- The OSI/TCP-IP Model
- Data Link Layer
- Network Layer
- Transport Layer
- Proxy and Proxy Servers
- TOR
- VPN
- Remote login: SSH and telnet
- Introduction to NAT and Port Forwarding
Footprinting
- Types of Footprinting
- Footprinting Tools
- Google Hacking
- Footprinting with Social Engineering
- Footprinting Countermeasures
Scanning
- Scanning Methodology
- Banner Grabbing
- Evading IDS and Firewalls
- Vulnerability Scanning
- Mapping Networks
- Scanning Countermeasures
Enumeration
- Basics and overview
- Techniques of enumeration
- NetBIOS Enumeration
- SNMP Enum
- LDAP Enum
- DNS Enum
- SMB Enum
- NTP Enum
- Enumeration Countermeasures
System
Hacking
- Introduction
- Password Cracking
- NetBIOS Enumeration
- MetaSploit
- Windows Pentesting
- Privilege Escalation
- Executing Applications
- Hiding Files
- Covering Tracks
- Countermeasures
Enumeration
- Basics and overview
- Techniques of enumeration
- NetBIOS Enumeration
- SNMP Enum
- LDAP Enum
- DNS Enum
- SMB Enum
- NTP Enum
- Enumeration Countermeasures
Malwares
- Malware concepts
- Viruses
- Ransomwares
- Worms
- Trojans
- Malware Detection
- Malware Analysis
- Countermeasures
Sniffing and
Spoofing
- Sniffing concepts
- MAC Attacks
- DHCP Attacks
- IP Spoofing
- ARP Poisoning
- Spoofing Attacks
- DNS Poisoning
- Sniffing Tools
- Countermeasures
Social
Engineering
- SE Concepts
- SE Techniques
- Identity thefts
- SE Tools
- SE Countermeasures
Denial of
Service
- DoS/DDoS Concepts
- DoS attack techniques
- Botnet
- Attack tools
- Countermeasures
Session
Hijacking
- Concepts
- Application level session hijacking
- Network level session hijacking
- Session Hijacking tools
- Countermeasures
Hacking Web
Servers
- Web server concepts
- Webserver Attacks
- Attack Methodology
- Web server attack tools
- Countermeasures
Hacking Web
Applications
- Firewalls
- Intrusion Detection/Prevention Systems
- Honeypots
- Evading IDS
- Evading Firewalls (Bitvise)
IDS, Firewalls
and
Honeypotss
- Web server concepts
- Webserver Attacks
- Attack Methodology
- Web server attack tools
- Countermeasures
Wireless
Pentesting
- Wireless Concepts
- Wireless Encryption
- Wireless threats
- Wireless Hacking Methodology
- Wireless hacking tools
- Countermeasures
- Wireless Security tools
Mobile Platform
Pentesting
- Mobile attack vectors
- Hacking Android OS
- Hacking iOS
- Mobile Security Guidelines and tools
Mobile Platform
Pentesting
- Mobile attack vectors
- Hacking Android OS
- Hacking iOS
- Mobile Security Guidelines and tools
Cryptography
- Cryptography concepts
- Encryption algorithms
- Cryptography tools
- Public Key Infrastructure
- Cryptanalysis
Cloud
Computing
- Cloud Computing concepts
- Cloud Computing threats
- Cloud Computing attacks
- Cloud security
- AWS Demo
Forensics
- Computer Forensics
- Investigation Process
- Incident Response
- Hard Disks and File systems
- Windows Forensics
- Linux Forensics
- Mobile forensics
- Digital Forensic Tools
- Digital Forensics with Autopsy
- Forensic Reporting