0% found this document useful (0 votes)
19 views18 pages

Cyber Security

Cyber security presentation

Uploaded by

postbox.bankingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views18 pages

Cyber Security

Cyber security presentation

Uploaded by

postbox.bankingg
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Cyber

Security
COURSES
Introduction
IWelcome to our Cyber Security course, offering two
specialized tracks: “Cyber Security Analyst” and “Cyber
Security Professional.” In the Analyst course, develop
skills in threat analysis, vulnerability identification, and
risk mitigation. The Professional course covers network
security, ethical hacking, incident response, and system
architecture. Crafted by industry experts, these courses
ensure you’re equipped to navigate the evolving
cybersecurity landscape. Ideal for beginners and
professionals alike, our program provides hands-on
experience and real-world simulations. Join us on this
educational journey to gain the expertise necessary for
securing digital environments.

Your future in cybersecurity starts here!


Page-1
Cyber security Proffesional
Duration - 6 months

Our Price - £1700


Offer Price - £999.

MODULES
1 INTRODUCTION TO NETWORKING
.

• Types of Computer Networks


• Networking Devices
• Networking Topologies
• Transmission Media
• Standards & OSI Reference Model
• Networking Protocols
• Routing & Switching
• Troubleshooting
• Basic Overview of Virtualization
• Different generations of SOC
• SIEM Tools
• SIEM Architecture
• Incident Response
• Investigation In SOC
2 ANDROID PENTESTING
.

• Overview of Android Operating


• System Importance of Android Security
• Static & Dynamic Analysis
• Decompiling Android APKs using Jadx, Mobsf
• Analyzing Application Codes
• ldentifying Vulnerabilities in Android APKs
• Exploiting Input Validation Flaws
• Testing for Insecure Data Storage
• Testing for Authentication & Authorization Flaws
• Testing Android APKs using Drozer
3 SECURITY OPERATIONS CENTRE
.

• Introduction to SOC
• What is Security Management
• What is Security Operations Center (SOC)
• Need of SOC
• Why SOC
• How SOC helps in building better security
• The traditional idea of SOC
• Security Information Event Management
• Event Logs
• People in SOC
4 WIRELESS PENTESTING
.

• Wireless Reconnaissance
• ldentify Wireless Network
• Vulnerability Research
• Exploitation
• Remediation & Security Controls
• Making Wireless Hacking Device
• Detecting Hidden SSID
• Aircrack-ng
• Wireless Pentesting: Wifipumkin3
• Fluxion
5 ACTIVE DIRECTORY PENTESTING
.

• Overview of Active Directory


• Importance of Active Directory Security
• Types of attacks against Active Directory
• Reconnaissance & Information Gathering
• Attacking the Active Directory
• Kerberoasting
• ASREPRoasting
• Attacks using Impacket
• Pass-the-Hash attacks
• Maintaining Access
• Evasion Techniques
• Wireshark
• Ettercap
• Nmap Scanning and Enumeration Techniques
• Spoofing
6 WEB APPLICATION PENTESTING
.

• Introduction to Web Application


• Fundamentals of HTTP
• Configuring Web application
• Importance of Web Application Security
• Web Application Security Frameworks
• Methodology
• Planning Phase
• Attack/Execution Phase
• Post-Execution Phase
• Web Application Vulnerabilities
• Password Attacks
• Vulnerability Scanning
• SQL Injection
• XSS
• Burp suite for Pentesters
• Fuzzing & Directory Enumeration
• Multiple ways to Banner Grabbing
• Web shells & Reverse shells
7 MICROSOFT
.

• Configuring Windows Server


• Active Directory Domain Services
• ADDS Account Creation & Management
• GPO Management & DHCP
• Windows Server Security & Encryption
• RAID Levels • Kerberos

8 OFFENSIVE SECURITY
.

• Comprehensive Pentest Planning, Scoping & Recon


• Scanning & Initial Access
• Exploitation
• Password Attacks & Pivoting
• Reporting & Analysis
• Tools 8& Techniques
9 NETWORK PENTESTING
.

• Reconnaissance & Enumeration Techniques


• OSINT & Social Engineering
• Target Discovery
• Vulnerability ldentification
• Service & System Exploitation
• Protocol Attacks
Page-1
Cyber security Analyst
Duration - 2 months

Our Price - £999


Offer Price - £599.

MODULES
1 CYBER SECURITY 101
.

• Introduction to Cybersecurity Cybersecurity


• Terminologies
• CIA Triad
• Cyber Kill Chain
• Phases of hacking & Penetration Testing
• PCIDSS
• Operating Systems
2 NETWORK FUNDAMENTALS
.

• OSI & TCP/IP MODELS


• Networking Devices
• Networking Protocols
• Packet Analysis Using Wireshark

3 PRE ENGAGEMENT INTERACTION


. -

• Policy and Procedures


4 RECONNAISSANCE OSINT
. &

• Active Reconnaissance & Passive Reconnaissance


• Google Dorking
• Data Breaches
• Shodan
• Social Engineering Techniques

5 VULNERABILITY IDENTIFICATION
.

• Manual Assessment Automated


• Scannings

6 EXPLOITATION
.

• Exploiting Vulnerable Hosts


• Metasploit Framework
• Manual Exploitations
• Payloads & Shellcodes
7 POST EXPLOITATION
. - ,

RISK ANALYSIS &

RECOMMENDATIONS
• Credential Harvesting
• Obtaining User Details & Privileges
• Kernel Exploitation
• Exploiting Scheduled Tasks
• Configuration Files 8 WEB APPLICATION
.

• Migration
• Mimikatz
PENTESTING
• Suid Binary exploitation
• Fundamentals of Web Application
• Web application Security & Common Attacks
• OWASP Top 10 Vulnerabilities
• SANS 20
• Planning Phase
• Attacking & Execution Phase
• Post Execution Phase
• Burpsuite 101
• Web Application penetration testing Tools
9 WIRELESS PENETRATION TESTING
.

• Introduction to Wireless Security


• Vulnerability Analysis Of WIFI Network
• SSID Discovery
• Aircrack-ng
• Bettercap
• Wifite
• Fluxion
• Wifi-Hacking Gadgets Developing

10 PHYSICAL SECURITY TESTING


.

• Reporting
• Create a Professional Penetration Testing Report
CERTIFICATIONS
Unlock the potential for international certifications like
CompTIA A+, Security+, Pentest+, and CySA+ and take
charge of your professional journey. While exam fees
are additional, we offer guidance and support for
hassle-free booking
Thanks!
For more information, pls contact:
+44 (0) 7448557000 / +44 (0) 7449900671
[email protected]

page-1 .international
Page-1 International Ltd

You might also like