0% found this document useful (0 votes)
59 views2 pages

Cybersecurity Professional Training

This document provides information about a cybersecurity professional course offered by Zoom Technologies. The course is mapped to the US-Council cybersecurity curriculum and taught by expert instructors with decades of industry experience. The course consists of three modules covering security risk assessment, proactive defense and countermeasures, and security information and event management (SIEM) and incident response. It teaches a wide range of cybersecurity topics including ethical hacking, penetration testing, malware, phishing, firewalls, intrusion prevention, and more.

Uploaded by

Deeq Huseen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views2 pages

Cybersecurity Professional Training

This document provides information about a cybersecurity professional course offered by Zoom Technologies. The course is mapped to the US-Council cybersecurity curriculum and taught by expert instructors with decades of industry experience. The course consists of three modules covering security risk assessment, proactive defense and countermeasures, and security information and event management (SIEM) and incident response. It teaches a wide range of cybersecurity topics including ethical hacking, penetration testing, malware, phishing, firewalls, intrusion prevention, and more.

Uploaded by

Deeq Huseen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Cybersecurity Professional

Welcome to the Cybersecurity course. This course is mapped to the popular Cybersecurity Professional
course from the US-Council (www.us-council.com). Zoom Technologies are the official training
partners of US-Council.

In today's increasingly interconnected world, protecting your organization's critical information and
systems from cyber threats is more important than ever. This course is designed to give you a
comprehensive understanding of cybersecurity concepts and practices, equipping you with the skill s
and knowledge necessary to defend against cyber attacks. You will learn about various types of
threats, including malware, phishing, and social engineering, as well as the strategies and
technologies used to detect, prevent, and respond to them right from risk management, to ethical
hacking and penetration testing. Whether you are a network administrator or security professional, or
simply interested in learning about cybersecurity, this course will provide you with the skills you need
to help keep your systems and data secure.

Our USP: Our cybersecurity expert instructors are experts in every sense of the word - they have a
formidable reputation in the industry as real time cybersecurity gurus with decades of experience. All
our classes are conducted LIVE with 100% Student Interaction. Our world class instructors,
courseware and labs ensure that the students gain hands on Practical Knowledge and are not
limited to theory alone. Come, ZOOM with us into a cybersecurity career!

Course Outline

This Course Consists of Three Modules:

1. Security Risk Assessment (Ethical Hacking)


2. Proactive Defense and Countermeasures
3. SIEM & Incident Response

A Few Topics:

 Vulnerability Auditing
 Penetration Testing
 Wi-Fi Hacking
 IoT Device Hacking
 Phishing
 Whaling
 Darkweb

+91 40 2339 4150 | [email protected] | www.zoomgroup.com


Course Curriculum

Module 1: Security Risk Assessment (Ethical Hacking) Blockchain Attacks


● What is Blockchain
Introduction to Hacking ● Blockchain Attacks
● What is Hacking
● What is Ethical Hacking Covering Tracks
● What is Information Security DoS
● What is Information Assurance ● What is DoS
● CIA Triad ● DoS attack techniques
● Stages of Hacking Anonymizers
● What is an anonymizer
Vulnerability Based Hacking ● Proxy server
Footprinting ● VPN server
● What is Footprinting ● TOR Browser
● Footprinting Objectives DarkWeb
● Footprinting Techniques ● What is DarkWeb
Scanning ● Different DarkWeb technologies
● What is Scanning
● What is Enumeration Cyber Kill Chain
● Scanning Methodology Securing the network
● What is Vulnerability Auditing MITRE ATT&CK Framework
● What is Penetration Testing Security Compliance Standards
● Continuous Automated Red Teaming (CART)
● AI Fuzzing Module 2: Proactive Defence and Countermeasures
Hacking Web Applications
● Directory Traversal Introduction to Security
● Website Defacement ● Network Security Challenges
● Code Injection ● Elements of Information Security
● SQL Injection ● Security, Functionality and Usability Triangle
● XSS ● Zero Trust approach
Cryptography ● Castle Moat approach
● Common Terminology Firewall
● Symmetric Key Encryption ● What is a Firewall
● Asymmetric Key Encryption ● Types of Firewall
● Designing network security with Firewall
Password Hacking Attacks ● Secure Access Service Edge (SASE)
Password Cracking Attacks ● NAT
● Bruteforce attack ● Security Policy
● Dictionary attack ● Logs Management
● Rainbow table attack ● Application Security
Sniffers ● Content / Web Security
● What is a sniffer ● Authentication
● Sniffing techniques Virtual Private Networks
● ARP Poisoning ● What is VPN
● Session Hijacking ● Type of VPNs
Phishing ● GRE
● What is Phishing ● IPSEC
● Spear Phishing ● SSL
● Deepfake Phishing Intrusion Prevention Systems
● Whaling ● What is an Intrusion Detection System
● Pharming ● What is an Intrusion Prevention System
Wireless Hacking Unified Threat Management
● What is a wireless network ● What is UTM
● Types of wireless networks ● How UTM is different from Firewall
● Wireless network attacks ● Advantages of UTM
Malware
● What is a Malware High Availability
● Types of Malwares Virtual / Cloud Devices
IoT Attacks Cisco ASA
● What is IoT Stormshield UTM
● IoT communication methods
● IoT Operating Systems Module 3: SIEM & Incident Response
● IoT Attacks
Cloud Computing SIEM
● What is Cloud Computing
● What is SIEM
● Types of Cloud Computing
● Functions of SIEM
● SIEM architecture
● Types of Cloud Computing Services
● Cloud Computing Attacks
Incident Management
● Incident response policy
● Incident Handling

+91 40 2339 4150 | [email protected] | www.zoomgroup.com

You might also like