Diploma in Cyber Security & Ethical Hacking 2021 Program
Diploma in Cyber Security & Ethical Hacking 2021 Program
2021 Program: -
First Semester
• C Programming Language
• Python Programming 3.9
• Linux RHCSA RHCE & Kali Linux
• CCNA 200-301 Cisco Certified Network Associate
• CEHv11 Certified Ethical Hacking Version 11
• ECSAv10 EC Council Certified Security Analyst V10
Second Semester
• Network Security & Network Penetration Testing
• Web Security & Web Application Penetration Testing
• Computer Forensic & Computer Investigation CHFIv9
• Cloud Security & Cloud Penetration Testing
• IOT Security & IOT Penetration Testing
• Server Security & Server Penetration Testing
• Machine Learning Security & Penetration Testing
C Programming Language
Fundamental of C Language:-
• About C tutorial
• Important points about C
• Why Use C
• Applications of C
• C Language and English Language
• Features of C
• C, C++ and Java
Overview of C Language: -
• History of C
• First Program in C Hello World
• Basic Structure of C Programming
• Tokens in C
• Keywords in C
• Identifiers in C
• Format Specifiers
• Format Specifiers Examples
Data Types in C Language: -
• Introduction to Data Types in C
• int Data Type in C
• float Data Type in C
• double Data Type in C
• char Data Type in C
Variable in C Language: -
• Variable Introduction in C
• Variable Declaration and Initialization
• Variable types and Scope in C
• Local Variable in C
• static Variable in C
• Global variables in C
• Storage Class in C
• Constants in C
Operators and Enums in C Language: -
• Introduction to Operator
• Arithmetic Operators in C
• Relational Operators in C
• Bit-wise Operators in C
• Logical Operators in C
• Assignment Operators in C
• Conditional Operator in C
• sizeof() Operator in C
• Operator Precedance
Pointer in C Language: -
• Pointer in C
• types of pointer
• NULL pointer
• Dangling Pointer
• Void/Generic Pointers
• Wild Pointer
• Near, Far and Huge Pointer
• Pointer Expressions and Arithmetic
• Pointer and Array
• Strings as pointers
• Pointer to Function
• Call by Reference in C
Structure in C Language: -
• Structure in C
• Nested Structure in C
• Array of Structures in C
• Pointer to Structure
• Structure to Function in C
• typedef in C
• typedef vs #define in C
• Union in C
File Input / Output: -
• Introduction to File
• File Operation in c
• Anaconda
• Spyder
• Jupyter Notebook
• Create and Share Jupyter Notebook
Python Basics
• b. Dictionaries
• c. Sets
• f. Code Reusability
• i. Creating and Importing Modules
User management :
Run levels :
• Understanding the different types of run-levels
• Understanding different types of shutdown commands
• Understanding run control scripts
• Understanding the different types
XINETD :
TCP WRAPPER :
Automation of jobs :
• Understanding DHCP
• Configuring DHCP server for different DHCP clients
APACHE :
• Understanding APACHE
• Configuring APACHE web server with virtual hosting
• Configuring APACHE web server with IP BASED, HOST BASED and
PORT BASED
• Configuring member logins for APACHE web server
SAMBA :
SQUID :
• Understanding SQUID proxy
• Configuring SQUID proxy with ACL
Raid levels :
Explain and select the appropriate administrative tasks required for a WLAN
• Information Intelligence.
• Information Intelligence
• Organize Your Information
• Google/Bing Hacking.
• Hunting And Profiling People.
• Gathering Email Accounts Sub domains/host.
• Whois Lookup
• OS Info Hunting
• Uptime Info Hunting
• Webserver Info Hunting
• Traceroute Target IP Address
• TCP Port Scanning
• TCP SYN Port Scanning
• TCP ACK Firewall Scanning
• Finding Live Hosts
• UDP Sweeping And Probing
• Database Enumerating
• MySQL Server Enumerating
• DNS Enumerating
• SNMP Enumerating
• Password Attacks
• Advanced Web Server Fingerprinting
• Advanced Web Application Fingerprinting
• Advanced Web Application Firewall Fingerprinting
• Advanced OS Fingerprinting
• Attacking DHCP Servers
• Writing Virus Codes
• Writing Advance Backdoors for Windows
• Attacking Network Switches
• Attacking FTP Servers
• Advanced Social Engineering Attacks
• Advanced Cross Site Scripting attacks
• From Reflected XSS To Reverse Shell
• From Stored XSS To Reverse Shell
• Advanced File Handling Attacks
• From File Upload To Reverse Shell
• From Remote File Inclusion To Reverse Shell
• From Local File Inclusion To Reverse Shell.
• From SQL Injection To Reverse Shell
• Advanced CSRF Attacks
• Session Hijacking Attacks
• Advanced System Command Injection Attack
• Sniffing Network Passwords
• Sniffing HTTP Passwords
• Sniffing Ftp And Telnet Passwords
• Advanced Sniffing
• Sniffing Facebook Cookies
• Advanced SSL Sniffing
• Advanced Network Attacks
• From Man In The Middle Attack To Full Network
• Advanced Mobile Hacking Tactics
• Attacking WEP Protected 802.11 Networks
• Attacking WPA/WPA2 Protected 802.11 Networks
• Attacking Apache Web Server
• Attacking IIS Web Server
• Buffer Overflow Attacks
• Advanced Stateful Packet Inspection Firewall Evasion And Bypassing
• Advanced Antivirus Detection Evasion And Bypassing
• Advanced Windows User Access Control (UAC) Evasion And Bypassing
• Advanced Firewall Outbound/Inbound Rules Evasion And Bypassing
• Vulnerability Vs Penteration Testing
Course Topics
• Interception Proxies
o ZAP (Zed Attack Proxy)
o BurpSuite Professional
• Common Vulnerabilities
o SSL/TLS misconfigurations
o Username harvesting
o Command Injection
o SQL Injection
o Cross-Site Scripting (XSS)
o Insecure Deserialization
o XML External Entities (XXE)
o Local and Remote File Inclusion (LFI / RFI)
o Cross-Site Request Forgery (CSRF)
• Open Source Intelligence (OSINT)
• Target Profiling
• Application Discovery
• Authentication and Authorization
• Session Management Flaws
• Automated Exploitation
Hands-On Training
User Administration:
Run levels:
Cloud Computing
What is virtualization?
AWS Platform
EC2 Instance
• Understanding AMI
• Launching your first AWS instance
• On-demand Instance pricing
• Reserved Instance pricing
• Spot instance pricing
• Setting up security
• Security groups
• Choosing & Creating a new AMI
• Public and Private IP’s
• Deploying a new instance from the created AMI
• Key Pairs
• Elastic IP’s
Load Balancing
• Introduction to Scaling
• ELB(Elastic Load Balancer)
• Components and types of load balancing
Auto-scaling
Storage in Cloud
Cloud Front
• Use of cloud front
• Creating a cloud front distribution
• Hosting a website of cloud front distribution
• Implementing restrictions
• Configuring origins and behaviors
Route53
• Creating Zones
• Hosting a website
• Understanding routing policies
• Weighted simple and failover policies
• Introduction to RDS
• Different database services of AWS: Amazon RDS, Dynamo DB, Redshift etc.
• Configuring the database
• Configuring backups
• Configuring the maintenance windows
• Connecting to the database
Dynamo DB
• Creating a dynamo dB
• Configuring alarms
• Adding data manually
Management Tools
Application Services
• What is SNS
• Creating a topic
• Create subscription
• Subscribed to the subscription
• SQS
• SES
• Lambda and Elastic Beanstalk
AWS Troubleshooting
• Introduction
• What is Machine Learning
o Definitions – Theoretical
o Definitions – Applied Practice
• What is Artificial Intelligence
o Definitions – Theoretical
o Definitions – Applied Practice
• Machine Learning vs AI
• Machine Learning vs Deep Learning
• What makes Machine Learning tick
o Algorithms
▪ History, Authors
▪ Purpose or Objective (Minimize Error or Cost
Function)
▪ Variety of Algorithms
▪ Learning Style
▪ Similarity Style
▪ Number of Algorithms
▪ Infographic
▪ Top 10/Most Common ML Algorithms
• Types of Machine Learning
o Supervised
o Unsupervised
o Reinforcement
• General Steps or Process of Machine Learning
o SourceX -> Feature Extraction -> Feature Correlation ->
o Feature TransformX-> Train Model-> Ensemble-> Evaluate
o Data cleaning, data transform/fitting
o Overfitting, Underfitting, Variance, Bias
• Required Maths
o Linear Algebra - In Numpy
o Probability
o Stats
o Calculus (Derivates)
• Tool Kit
o Python Basics
o Python Advance
o Numpy
o Pandas
o Matplotlib
o Scikit-learn or sklearn Library
Module 2
• Supervised Learning
o Classification
▪ Random Forest
▪ Decision Trees
▪ Logistic Regression
▪ Support Vector Machines
▪ KNN
▪ Naïve Bayes
▪ Usage
o Regression
▪ Linear Regression
▪ Regularization Techniques (LASSO)
▪ Polynomial Regression
▪ Usage
o Case Study (Classification)
Module 3
Unsupervised Learning
o Clustering
▪ K-Means
▪ K Nearest Neighbours
▪ Association Rule Learning
o Dimensionality Reduction
▪ PCA
▪ SVD
▪ tSNE
o Case Study (Clustering/Anomaly/Fraud Detection)
Module 4
• Reinforcement Learning
o Markov Decision
o Monte Carlo Prediction
o Case Study (next best offer, dynamic pricing)
Module 5
Module 6