0% found this document useful (0 votes)
82 views6 pages

Course Curriculum

The document outlines the curriculum for a cybersecurity course called "Datapro Cybersecurity". The curriculum contains 19 modules that cover topics such as ethical hacking, footprinting and reconnaissance, scanning networks, vulnerability analysis, system hacking, malware threats, sniffing, social engineering, denial of service attacks, session hijacking, evading security systems, hacking web servers, web applications, SQL injection, wireless networks, mobile platforms, IoT, cloud computing, and cryptography. Each module contains multiple lessons that provide in-depth coverage of techniques, tools, countermeasures, and hands-on penetration testing exercises for each topic.

Uploaded by

muna cliff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views6 pages

Course Curriculum

The document outlines the curriculum for a cybersecurity course called "Datapro Cybersecurity". The curriculum contains 19 modules that cover topics such as ethical hacking, footprinting and reconnaissance, scanning networks, vulnerability analysis, system hacking, malware threats, sniffing, social engineering, denial of service attacks, session hijacking, evading security systems, hacking web servers, web applications, SQL injection, wireless networks, mobile platforms, IoT, cloud computing, and cryptography. Each module contains multiple lessons that provide in-depth coverage of techniques, tools, countermeasures, and hands-on penetration testing exercises for each topic.

Uploaded by

muna cliff
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Datapro Cybersecurity

Course Curriculum:
Module 01 - Introduction to Ethical Hacking
Lesson 01 - Information Security Overview
Lesson 02 - Information Security Threats and Attack
Vectors Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards

Lesson 02 - Footprinting and Reconnaissance


Lesson 01 - Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06 - Email Footprinting
Lesson 07 - Competitive
Intelligence Lesson 08 - Whois
Footprinting Lesson 09 - DNS
Footprinting Lesson 10- Network
Footprinting
Lesson 11- Footprinting through Social Engineering
Lesson 12 - Footprinting Tools
Lesson 13 - Countermeasures
Lesson 14 - Footprinting Pen
Testing

Module 03 - Scanning Networks


Lesson 01 - Network Scanning
Concepts Lesson 02 - Scanning Tools
Lesson 03 - Scanning Techniques
Lesson 04 - Scanning Beyond IDS and
Firewall Lesson 05 - Banner Grabbing
Lesson 06 - Draw Network
Diagrams Lesson 07 - Scanning Pen
Testing
Module 04 - Enumeration
Lesson 01 - Enumeration
Concepts Lesson 02 - NetBIOS
Enumeration Lesson 03 - SNMP
Enumeration Lesson 04 - LDAP
Enumeration Lesson 05 - NTP
Enumeration
Lesson 06 - SMTP Enumeration and DNS
Enumeration Lesson 07 - Enumeration
Countermeasures
Lesson 08 - Other Enumeration
Techniques Lesson 09 - Enumeration Pen
Testing

Module 05 - Vulnerability Analysis


Lesson 01 - Vulnerability Assessment
Concepts Lesson 02 - Vulnerability
Assessment Solutions Lesson 03 -
Vulnerability Scoring Systems Lesson 04 -
Vulnerability Assessment Tools Lesson 05 -
Vulnerability Assessment Reports

Module 06 - System Hacking


Lesson 01 - System Hacking
Concepts Lesson 02 - Cracking
Passwords Lesson 03 - Escalating
Privileges Lesson 04 - Executing
Applications Lesson 05 - Hiding Files
Lesson 06 - Covering Tracks
Lesson 07 - Penetration
Testing

Module 07 - Malware Threats


Lesson 01 - Malware
Concepts Lesson 02 - Trojan
Concepts
Lesson 03 - Virus and Worm Concepts
Lesson 04 - Malware Analysis
Lesson 05- Countermeasures
Lesson 06- Anti-Malware
Software
Lesson 07- Malware Penetration Testing
Module 08 - Sniffing
Lesson 01- Sniffing Concepts
Lesson 02- Sniffing Technique: MAC Attacks
Lesson 03- Sniffing Technique: DHCP Attacks
Lesson 04- Sniffing Technique: ARP Poisoning
Lesson 05- Sniffing Technique: Spoofing
Attacks Lesson 06- Sniffing Technique: DNS
Poisoning Lesson 07- Sniffing Tools
Lesson 08- Countermeasures
Lesson 09- Sniffing Detection
Techniques Lesson 10- Sniffing Pen
Testing

Module 09- Social Engineering


Lesson 01 - Social Engineering Concepts
Lesson 02 - Social Engineering
Techniques Lesson 03- Insider Threats
Lesson 04 - Impersonation on Social Networking
Sites Lesson 05 - Identity Theft
Lesson 06 - Countermeasures
Lesson 07 - Social Engineering Penetration Testing

Module 10- Denial-of-Service


Lesson 01 - DoS/DDoS Concepts
Lesson 02 - DoS/DDoS Attack Techniques
Lesson 03 - Botnets
Lesson 04 - DDoS Case Study
Lesson 05 - DoS/DDoS Attack Tools
Lesson 06 - Countermeasures
Lesson 07 - DoS/DDoS Protection Tools
Lesson 08 - DoS/DDoS Attack Penetration Testing

Module 11- Session Hijacking


Lesson 01- Session Hijacking Concepts
Lesson 02- Application Level Session
Hijacking Lesson 03- Network Level Session
Hijacking Lesson 04- Session Hijacking Tools
Lesson 05- Countermeasures
Lesson 06- Penetration
Testing
Module 12 - Evading IDS, Firewalls, and Honeypots
Lesson 01- IDS, Firewall, and Honeypot Concepts
Lesson 02- IDS, Firewall, and Honeypot
Solutions Lesson 03- Evading IDS
Lesson 04- Evading Firewalls
Lesson 05- IDS/Firewall Evading
Tools Lesson 06- Detecting
Honeypots
Lesson 07- IDS/Firewall Evasion
Countermeasures Lesson 08- Penetration Testing

Module 13- Hacking Web Servers


Lesson 01- Web Server
Concepts Lesson 02- Web
Server Attacks
Lesson 03- Web Server Attack Methodology
Lesson 04- Web Server Attack Tools
Lesson 05- Countermeasures
Lesson 06- Patch Management
Lesson 07- Web Server Security
Tools Lesson 08- Web Server Pen
Testing

Module 14- Hacking Web Applications


Lesson 01 - Web App Concepts
Lesson 02 - Web App Threats
Lesson 03 - Hacking Methodology
Lesson 04 - Web Application Hacking Tools
Lesson 05 - Countermeasures
Lesson 06 - Web App Security Testing Tools
Lesson 07 - Web App Pen Testing

Module 15- SQL Injection


Lesson 01 - SQL Injection Concepts
Lesson 02 - Types of SQL Injection
Lesson 03 - SQL Injection Methodology
Lesson 04 - SQL Injection Tools
Lesson 05 - Evasion
Techniques Lesson 06 -
Countermeasures
Module 16- Hacking Wireless Networks

Lesson 01 - Wireless Concepts


Lesson 02 - Wireless Encryption
Lesson 03 - Wireless Threats
Lesson 04 - Wireless Hacking Methodology
Lesson 05 - Wireless Hacking Tools
Lesson 06 - Bluetooth Hacking
Lesson 07 - Countermeasures
Lesson 08 - Wireless Security
Tools Lesson 09 - Wi-Fi Pen
Testing

Module 17- Hacking Mobile Platforms


Lesson 01- Mobile Platform Attack
Vectors Lesson 02- Hacking Android OS
Lesson 03- Hacking iOS
Lesson 04- Mobile Spyware
Lesson 05- Mobile Device Management
Lesson 06- Mobile Security Guidelines and
Tools Lesson 07- Mobile Pen Testing

Module 18- IoT Hacking


Lesson 01- IoT
Concepts Lesson 02-
IoT Attacks
Lesson 03- IoT Hacking Methodology
Lesson 04- IoT Hacking Tools
Lesson 05-
Countermeasures Lesson
06- IoT Pen Testing

Module 19- Cloud Computing


Lesson 01 - Cloud Computing Concepts
Lesson 02 - Cloud Computing Threats
Lesson 03 - Cloud Computing Attacks
Lesson 04 - Cloud Security
Lesson 05 - Cloud Security Tools
Lesson 06 - Cloud Penetration
Testing
Module 16- Hacking Wireless Networks

Lesson 01- Cryptography


Concepts Lesson 02-
Encryption Algorithms
Lesson 03- Cryptography
Tools
Lesson 04- Public Key
Infrastructure (PKI) Lesson 05-
Email Encryption
Lesson 06- Disk
Encryption Lesson 07-
Cryptanalysis
Lesson 08- Countermeasures

You might also like