Cyber Security Course Content
Cyber Security Course Content
Internet
• History of internet
• Internet life cycle
• Submarine cable map
Network
• Types of networks
• Topologies
• OSI model
• TCP/IP model
• IP address
• Subnet masking
Operating system
• Kernel's
• BIOS
• Functions of BIOS
• Architectures of OS
Introduction to Ethical Hacking
• What is Hacking
• Who is a Hacker
• Skills of a Hacker
• Types of Hackers
• Reasons for Hacking
• Who are at the risk of Hacking attacks
• Effects of Computer Hacking on an organization
• The Security, Functionality & Usability Triangle
• What is Ethical Hacking
• Why Ethical Hacking is Necessary
• Scope & Limitations of Ethical Hacking
Foot printing and Reconnaissance
• What is Foot Printing
• Objectives of Foot Printing
• Finding a company’s details
• Finding a company’s domain name
• Finding a company’s Internal URLs
• Finding a company’s Server details
• Finding the details of domain registration
Cyber Security Training Course Syllabus
Social Engineering
• Phishing
• What is Phishing
• How Phishing website is hosted
• How victims are tricked to access Phishing websites
• How to differentiate a Phishing webpage from the original webpage
• How to defend against Phishing attacks
• Homograph attack
• Types of sniffing
• Active sniffing
• Passive Sniffing
• What is ARP
• ARP poison attack
• Threats of ARP poison attack
• How MAC spoofing works
• MAC Flooding
• How to defend against MAC Spoofing attacks
• How to defend against Sniffers in network
Wireless Hacking
• Types of wireless networks
• Finding a Wi-Fi network
• Types of Wi-Fi authentications
• Using a centralized authentication server
• Using local authentication
• Types of Wi-Fi encryption methods
• WEP
• WPA
• WPA2
• How does WEP work
• Weakness of WEP encryption
• How does WPA work
• How does WPA2 work
• Hardware and software required to crack Wi-Fi networks
• How to crack WEP encryption
• How to crack WPA encryption
• How to crack WPA2 encryption
• How to defend against Wi-Fi cracking attack
Malware
• What is malware
• Types of malware
Virus
• What is a virus program
• What are the properties of a virus program
• How does a computer get infected by virus
• Types of virus
Cyber Security Training Course Syllabus
Worm
• What is a worm program
• How worms are different from virus
Trojan
• What is a Trojan horse
• How does a Trojan operate
• How to defend against Trojans
Spyware
• What is a spyware
• Types of spywares
• How to defend against spyware
Rootkits
• What is a Rootkit
• Types of Rootkits
• How does Rootkit operate
• How to defend against Rootkits