CSP v3 (Cyber Security Syllabus)
CSP v3 (Cyber Security Syllabus)
SECURITY
PROFESSIONAL
COURSE
CSP
@ISO 9001-2015
Certified Company
overview
of
CSP
A Comprehensive Cyber Security
Program
T H E C Y B E R H O S T
overview
This comprehensive cyber security and ethical
hacking course offers a well-rounded curriculum
covering all essential topics. It is designed to help
you kickstart a career in cyber security or
enhance your skills as a working professional.
The course spans over a duration of 3 months,
with a total of 56 modules to be covered.
COURSE
OUTLINE
CYBER SECURITY PROFESSIONAL COURSE IS
STRUCTURED INTO 7 LEVELS, WITH EACH LEVEL
COMPRISING VARIOUS MODULES, AND EACH
MODULE IS FURTHER BROKEN DOWN INTO SUB-
MODULES.
LEVEL - 1 LINUX FUNDAMENTALS
MODULE - 1
MODULE 1:
1. Fundamentals of Networking
2. Network Topologies and Types
3. Overview of Networking Hardware
4.Common Networking Protocols: HTTP, HTTPS, FTP, SSH
5. Understanding the OSI Model
6. Delving into the TCP/IP Model and Its Layers
7. IP Addressing: IPv4 and IPv6
8. Introduction to Firewalls
MODULE 4: ENUMERATION
1. Enumeration Concepts
2. NetBIOS Enumeration
3. SNMP Enumeration
4. LDAP Enumeration
5. SMTP and DNS Enumeration
MODULE 5: VULNERABILITY ANALYSIS
1. Netcat
2. Connecting to a TCP/UDP Port
3. Listening on a TCP/UDP Port
4. Transferring Files with Netcat
5. Remote Administration with Netcat
6. Socat
7. Netcat vs Socat
8. Socat File Transfers
9. Socat Reverse Shells
10. Socat Bind Shells
1. Malware Concepts
2. APT Concepts
3. Trojan Concepts
4. Virus and Worm Concepts
5. Fileless Malware Concepts
1. Sniffing Concepts
2. Sniffing Technique: MAC Attacks
3. Sniffing Technique: DHCP Attacks
4. Sniffing Technique: ARP Poisoning
5. Sniffing Technique: Spoofing Attacks
6. Sniffing Tools
MODULE 12: IDS, IPS, AND HONEYPOTS
1. IDS, IPS, Firewall, and Honeypot Concepts
2. IDS, IPS, Firewall, and Honeypot Solutions
1. IoT Concepts
2. IoT Attacks
3. IoT Hacking Methodology
1. Cryptography Concepts
2. Encryption Algorithms
3. Cryptography Tools
4. Public Key Infrastructure (PKI)
5. Email Encryption
6. Disk Encryption
MODULE 1:
1. Cloud Computing Concepts
2. Serverless Computing
3. Cloud Computing Threats
4. ntroduction to AWS
5. Creating an Account in AWS
6. Creating an EC2 Instance in AWS Cloud
LEVEL 6: WIRELESS NETWORKS
PENETRATION TESTING
MODULE 1:
1. Wireless Concepts
2. Wireless Encryption
3. Wireless Threats
4. Wireless Hacking Methodology
5. Wireless Hacking Tools
6. Bluetooth Hacking
7. Wireless Security Tools
LEVEL 7:
WEB APPLICATIONS PENETRATION
TESTING & BUG HUNTING
PROJECTS -
Skill Covered
What do our students say?
ELIGIBILITY CRITERIA
BASIC UNDERSTANDING OF
CYBERSECURITY ASPECTS
FUNDAMENTAL KNOWLEDGE
OF AN OPERATING SYSTEM
Target Audience
Anyone who is passionate
about Cybersecurity
Security Analysts
Ethical Hackers
Undergraduates/ graduates
seeking a career in Cyber
Security
the-cyberhost.com
AFTER THIS
COURSE
Penetration Tester
Cybersecurity Analyst
Security Engineer
Security Consultant
Web Application Penetration Tester
PROGRAM DETAILS
DURATION - 3 MONTHS
OUR OFFICES
DELHI :
F 611, Ramphal Chowk Rd,
Block F, Delhi, 110075
INDIA
Wyoming :
30 N Gould St Ste R
Sheridan, WY 82801
USA
CONTACT US
PHONE :
INDIA : USA :
+91 93154 57961 +1 (646) 631-8384
EMAIL :
[email protected]