0% found this document useful (0 votes)
132 views23 pages

CSP v3 (Cyber Security Syllabus)

CSP v3 (cyber security syllabus)

Uploaded by

rizwan8886909939
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views23 pages

CSP v3 (Cyber Security Syllabus)

CSP v3 (cyber security syllabus)

Uploaded by

rizwan8886909939
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

CYBER

SECURITY
PROFESSIONAL
COURSE

CSP
@ISO 9001-2015
Certified Company
overview

of
CSP
A Comprehensive Cyber Security
Program

T H E C Y B E R H O S T
overview
This comprehensive cyber security and ethical
hacking course offers a well-rounded curriculum
covering all essential topics. It is designed to help
you kickstart a career in cyber security or
enhance your skills as a working professional.
The course spans over a duration of 3 months,
with a total of 56 modules to be covered.
COURSE
OUTLINE
CYBER SECURITY PROFESSIONAL COURSE IS
STRUCTURED INTO 7 LEVELS, WITH EACH LEVEL
COMPRISING VARIOUS MODULES, AND EACH
MODULE IS FURTHER BROKEN DOWN INTO SUB-
MODULES.
LEVEL - 1 LINUX FUNDAMENTALS

MODULE - 1

1. Overview of UNIX/Linux Operating System


2. Linux File System Hierarchy
3. Steps for Linux Installation
4. Basic Linux Commands: ls, date, and cal
5. Directory Management in Linux
6. File Operations in Linux
7. Combining Multiple Commands in a Single Line
8. Searching with locate and find Commands
9. File Compression and Decompression Techniques
(tar, gzip)
10. Text Processing with paste, grep Commands
11. Managing File Permissions in Linux
12. Text Editing with vi, nano, and other editors
13. Package management with APT
14. Process management

LEVEL - 2 NETWORKING FUNDAMENTALS

MODULE 1:
1. Fundamentals of Networking
2. Network Topologies and Types
3. Overview of Networking Hardware
4.Common Networking Protocols: HTTP, HTTPS, FTP, SSH
5. Understanding the OSI Model
6. Delving into the TCP/IP Model and Its Layers
7. IP Addressing: IPv4 and IPv6
8. Introduction to Firewalls

LEVEL - 3 ETHICAL HACKING

MODULE 1: INTRODUCTION TO ETHICAL


HACKING AND CYBERSECURITY

1. Defining Hacking and Ethical Hacking


2. Distinguishing Cybersecurity from Information Security
3. Different Types of Hackers
4. Exploring the Phases of Hacking
5. Overview of Information Security
6. The CIA Triad: Confidentiality, Integrity, and Availability
7. Ethical Hacking Methodologies and Frameworks
8. Core Concepts of Ethical Hacking
9. Information Security Controls
10. Overview of Information Security Laws and Standards

MODULE 2: FOOTPRINTING AND


RECONNAISSANCE
1. Footprinting Concepts
2. Footprintingthrough Search Engines
3. Footprinting through Web Services
4. Footprinting through Social Networking Sites
5. Website Footprinting
6. Email Footprinting
7. Whois Footprinting
8. DNS Footprinting
9. Network Footprinting
10. Footprinting through Social Engineering

MODULE 3: SCANNING NETWORKS

1. Network Scanning Concepts


2. Scanning Tools
3. Host Discovery
4. Port and Service Discovery
5. OS Discovery (Banner Grabbing/OS Fingerprinting)

MODULE 4: ENUMERATION
1. Enumeration Concepts
2. NetBIOS Enumeration
3. SNMP Enumeration
4. LDAP Enumeration
5. SMTP and DNS Enumeration
MODULE 5: VULNERABILITY ANALYSIS

1. Vulnerability Assessment Concepts


2. Vulnerability Classification and Assessment Types
3. Vulnerability Assessment Tools
4. Vulnerability Assessment Reports

MODULE 6: SOCIAL ENGINEERING AND


PHISHING
1. Social Engineering Techniques
2. Insider Threats
3. Impersonation on Social Networking Sites
4. Identity Theft
5. Social Engineering & Phishing

MODULE 7: FILE TRANSFERS

1. Netcat
2. Connecting to a TCP/UDP Port
3. Listening on a TCP/UDP Port
4. Transferring Files with Netcat
5. Remote Administration with Netcat
6. Socat
7. Netcat vs Socat
8. Socat File Transfers
9. Socat Reverse Shells
10. Socat Bind Shells

MODULE 8: PASSWORD CRACKING

1. Introduction to Password Security


2. Understanding the role of passwords in security
3. Passwords vs. Passphrases
4. Storage of passwords (plaintext, hashed, salted)
5. Types of Password Attacks
6. Brute force attacks
7. Dictionary attacks
8. Phishing and social engineering methods
9. Online vs. Offline cracking
10. Overview of popular password cracking tools (John the
Ripper, Hashcat, Hydra, etc.)
11. Configuring and using tools for password cracking

MODULE 9: USING THE METASPLOIT


FRAMEWORK
1. Introduction to the Metasploit Framework
2. Exploring Metasploit's Capabilities
3. Setting Up and Running Exploits
4. Understanding Payloads, Shells, and Command Execution
5. Post-Exploitation Techniques and Meterpreter
6. Maintaining Access and Evading Detection
7. Utilizing Metasploit for Penetration Testing

MODULE 10: MALWARE THREATS

1. Malware Concepts
2. APT Concepts
3. Trojan Concepts
4. Virus and Worm Concepts
5. Fileless Malware Concepts

MODULE 11: SNIFFING

1. Sniffing Concepts
2. Sniffing Technique: MAC Attacks
3. Sniffing Technique: DHCP Attacks
4. Sniffing Technique: ARP Poisoning
5. Sniffing Technique: Spoofing Attacks
6. Sniffing Tools
MODULE 12: IDS, IPS, AND HONEYPOTS
1. IDS, IPS, Firewall, and Honeypot Concepts
2. IDS, IPS, Firewall, and Honeypot Solutions

MODULE 13: IOT HACKING

1. IoT Concepts
2. IoT Attacks
3. IoT Hacking Methodology

MODULE 14: CRYPTOGRAPHY

1. Cryptography Concepts
2. Encryption Algorithms
3. Cryptography Tools
4. Public Key Infrastructure (PKI)
5. Email Encryption
6. Disk Encryption

MODULE 15: STEGANOGRAPHY

1. Introduction to Steganography: The Art of Hiding


Information
2. Implementing Steganography in Images: A Step-by-Step
Guide
3. Applying Steganography to Videos: Techniques
MODULE 16: HACKING MOBILE PLATFORMS

1. Hacking an Android Device by Creating a Payload


2. Fatrat
3. App Analyzer
4. Unzipping and Unpacking Android Applications
5. Creating a Ransomware App

LEVEL 4: PRIVILEGE ESCALATION

Module 1: System Hacking


Module 2: Gaining Access
Module 3: Windows Privilege Escalation
Module 4: Linux Privilege Escalation

LEVEL 5: CLOUD COMPUTING & AWS


INTRODUCTION

MODULE 1:
1. Cloud Computing Concepts
2. Serverless Computing
3. Cloud Computing Threats
4. ntroduction to AWS
5. Creating an Account in AWS
6. Creating an EC2 Instance in AWS Cloud
LEVEL 6: WIRELESS NETWORKS
PENETRATION TESTING

MODULE 1:
1. Wireless Concepts
2. Wireless Encryption
3. Wireless Threats
4. Wireless Hacking Methodology
5. Wireless Hacking Tools
6. Bluetooth Hacking
7. Wireless Security Tools
LEVEL 7:
WEB APPLICATIONS PENETRATION
TESTING & BUG HUNTING

Module 1: Introduction to Web Applications


Module 2: Introduction to Bug Bounty
Module 3: Bug Bounty Ethical Guidelines and Responsible
Disclosure
Module 4: Web Technologies Overview
Module 5: Subdomain Analysis and Discovery
Module 6: Recon Automation using Bash Shell Scripting
Module 7: Finding Live Targets from Collected Subdomains
Module 8: Identifying Web Application Technologies and
Frameworks
Module 9: Google Dork
Module 10: Shodan Dork
Module 11: Finding Parameters
Module 12: Waybackurls
Module 13: Analysis and Reporting
Module 14: Analysis of Robots.txt File
Module 15: Recon Tools for Web Applications
Module 16: Using Burp Suite for Web Application Analysis
Module 17: OWASP TOP 10
Module 18: Remote Code Execution
Module 19: SQL Injection (SQLi)
Module 20: Reflected, Stored, and DOM-based Cross-Site
Scripting (XSS)
Module 21: Cross-Site Request Forgery (CSRF)
Module 22: Server-Side Request Forgery (SSRF)
Module 23: Directory Bruteforcing
Module 24: Authentication Bypass
Module 25: Insecure Direct Object Reference (IDOR)
Prevention
Module 26: Local File Inclusion (LFI) and Remote File
Inclusion (RFI)
Module 27: File Upload Vulnerabilities
Module 28: SSL/TLS Related Vulnerabilities
Module 29: Session Fixation
Module 30: Clickjacking
Module 31: EXIF Metadata Not Stripped From Uploaded
Images
Module 32: Google Dorking
Module 33: Unauthenticated FTP Access
Module 34: Broken Link Hijacking
Module 35: Content Management System Vulnerabilities
Module 36: HTML Injection
Module 37: Exposing Origin IP
Module 38: Parameter Tampering
Module 39: Cross-Origin Resource Sharing (CORS)
Misconfigurations

PROJECTS -

WEB APPLICATION PENETRATION TESTING


Tools Covered

Skill Covered
What do our students say?
ELIGIBILITY CRITERIA
BASIC UNDERSTANDING OF
CYBERSECURITY ASPECTS

FUNDAMENTAL KNOWLEDGE
OF AN OPERATING SYSTEM

Course Duration : 3 Months

Target Audience
Anyone who is passionate
about Cybersecurity

Security Analysts

Network and Security


Engineers

Ethical Hackers

Undergraduates/ graduates
seeking a career in Cyber
Security

the-cyberhost.com
AFTER THIS
COURSE
Penetration Tester
Cybersecurity Analyst
Security Engineer
Security Consultant
Web Application Penetration Tester
PROGRAM DETAILS
DURATION - 3 MONTHS

PROGRAM FORMAT - ONLINE

OUR OFFICES
DELHI :
F 611, Ramphal Chowk Rd,
Block F, Delhi, 110075
INDIA

Wyoming :
30 N Gould St Ste R
Sheridan, WY 82801
USA

CONTACT US
PHONE :

INDIA : USA :
+91 93154 57961 +1 (646) 631-8384

EMAIL :
[email protected]

You might also like