0% found this document useful (0 votes)
249 views33 pages

Cyber Security Ethical Hacking Internship Program - Curriculum

Uploaded by

Nelson Njuguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
249 views33 pages

Cyber Security Ethical Hacking Internship Program - Curriculum

Uploaded by

Nelson Njuguna
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

EDUREKA

Cyber Security & Ethical Hacking


Internship Program Curriculum
About Edureka
Edureka is one of the world’s largest and most effective online education platform
for students who aspire to be technology professionals. In a span of 10 years,
100,000+ students from over 176 countries have upskilled themselves with the
help of our online courses. Since our inception, we have been dedicated to helping
technology professionals from all corners of the world learn Programming, Data
Science, Big Data, Cloud Computing, DevOps, Business Analytic, Java & Mobile
Technologies, Software Testing, Web Development, System Engineering, Project
Management, Digital Marketing, Business Intelligence, Cybersecurity, RPA and
more.

We have an easy and affordable learning solution that is accessible to millions of


learners. With our learners spread across countries like the US, India, UK, Canada,
Singapore, Australia, Middle East, Brazil, and many others, we have built a
community of over 1 million learners across the globe.

About the Program


Edureka’s Cyber Security & Ethical Hacking Internship Program is designed to
meet the industry benchmarks and will help you master foundational skills that are
needed to pursue a career in Cyber Security. This course focuses on core cyber
security and ethical hacking skills which are indispensable for cyber security
professionals. Throughout the program, you will learn important concepts such as
Operating system fundamentals, testing Network Security and how a network
works from scratch. Also, you will learn Web Application Hacking and Security for
testing the security of web applications and find the severity of a threat using tools
such as Burp Suite, wfuzz, Recon-ng, Etc. Find trending threats that are dominant
in breaking Security with reference to OWASP Top 10.
INTERNSHIP PROGRAM CURRICULUM I 01

CONTENT
MODULE 1
Operating Systems & Networking Fundamentals
Linux Fundamentals
Tools in Kali Linux and System Security
OS Security and Basics of Networking
Network Security and Protocols
Module 1 Interview Preparation
Module 1 Mini Project: Secure User Access
Management in Linux 03
MODULE 2
Cryptography and Application Security
Cryptography and Access Control
Session Management and Web Security
Web Technologies and Database Security
File Security and Mobile Security
Module 2 Interview Preparation
Module 2 Mini Project: Web Application Source
Code Vulnerability Analysis 09
MODULE 3
Cyber Security Tools
Secure Development Methodologies and Cyber Security
Ethical Hacking
Anonymity and Information Gathering
Advanced Reconnaissance and Network Scanning
Enumeration
Module 3 Interview Preparation
Module 3 Mini Project: Information Gathering
On Websites using Linux 14
INTERNSHIP PROGRAM CURRICULUM I 02

MODULE 4
Web Application Hacking
Vulnerability Analysis and Introduction to Web Application Hacking
Advanced Web Application Hacking
SQL Injection and Tools
Session Hijacking and OWASP Part 2
OWASP Part 3 and Social Engineering
Module 4 Interview Preparation
Module 4 Mini Project: CTF (Capture The Flag) Challenge 19

INDUSTRY GRADE PROJECT


Ethically Hack an Amazon like
E-commerce Website 25
EVALUATIONS 26

CERTIFICATES 27

PLACEMENT ASSISTANCE 30
INTERNSHIP PROGRAM CURRICULUM I 03

MODULE 1

1 Operating Systems and Networking Fundamentals

Linux Fundamentals
2 Tools in Kali Linux and System Security
OS Security and Basics of Networking
Network Security and Protocols

3 Module 1 Interview Preparation

Module 1 Mini Project


4
Secure User Access Management in Linux

Operating Systems and Networking


5
Fundamentals Certificate
INTERNSHIP PROGRAM CURRICULUM I 04

Class 0 - Cyber Security Orientation

Introduction to Cyber Security and Ethical Hacking Internship


Program

What is Unique about this Internship?

Program Details and Features

Internship Class Schedule

Understanding Cyber Security and Ethical Hacking

Why Cyber Security?

Market Demand for Cyber Security Professionals Ethical


Hackers

Who is an Ethical Hacker?

Job Roles and responsibilities

Cybersecurity: Safeguarding Businesses and Online Assets

Explore the real-world challenges faced by enterprises


INTERNSHIP PROGRAM CURRICULUM I 05

Week 1 Linux Fundamentals

History of Linux

What is an Operating System?

Linux Operating System

Linux Distributions

Linux Architecture

Installing Linux on a virtual machine

Kali Linux overview

Tools in Kali Linux and


Week 2 System Security

Why Kali Linux?

Kali Linux Tools For Every Discipline

Operating System Functions

Operating System Threat

CIA Triad

Security Problems

Levels of Security Measures


INTERNSHIP PROGRAM CURRICULUM I 06

OS Security and
Week 3 Basics of Networking

User Authentication

Firewall System Protection

Security in Operating Systems

What is a Computer Network?

Types of Computer Networks

Network Topologies

Network Security
Week 4 and Protocols

TCP/IP Model

Addressing

IPv4 Packet Structure

Network Security Technologies

Code Execution Intrusion

Stack Buffer Overflow


INTERNSHIP PROGRAM CURRICULUM I 07

Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 08

Module 1 Mini Project


Secure User Access Management in Linux

Operating Systems & Networking


Fundamentals Certificate
upon completion of this project
INTERNSHIP PROGRAM CURRICULUM I 09

MODULE 2

1 Cryptography & Application Security

Cryptography and Access Control


Session Management and Web Security
2
Web Technologies and Database Security
File Security and Mobile Security

3 Module 2 Interview Preparation

Module 2 Mini Project:


4
Web Application Source Code Vulnerability Analysis

5 Cryptography & Application Security Certificate


INTERNSHIP PROGRAM CURRICULUM I 10

Week 5 Cryptography and Access Control

Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Thinking Like a Defender
Input Validation
Attack Surface Reduction
Classifying and Prioritizing Threat
Fundamentals of Authentication
Authorization using Access Control

Session Management and


Week 6 Web Security

Fundamentals of Session Management


Session State Management
Attacks Against Sessions
Attacks Against Session State
Securing Web Application Sessions
Best Practices
Introduction to Web Security
SSL & HTTPS
INTERNSHIP PROGRAM CURRICULUM I 11

Web Technologies and


Week 7 Database Security

ActiveX
Cookies Awareness
CGI Script
FTP Security
LDAP
Evasion Techniques
Using IBM Security AppScan Standard
SQL Injection Effects on CIA Triad

Week 8 File Security and Mobile Security

Keeping your source code secret


Security through obscurity
Forceful Browsing
Mobile Platform Attack Vectors
Mobile Device Management
Mobile security Guidelines
INTERNSHIP PROGRAM CURRICULUM I 12

Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 13

Module 2 Mini Project


Web Application Source Code Vulnerability Analysis

Cryptography & Application Security


Certificate
upon completion of this project
INTERNSHIP PROGRAM CURRICULUM I 14

MODULE 3

1 Cyber Security Tools

Secure Development Methodologies and Cyber Security


Ethical Hacking
2 Anonymity and Information Gathering
Advanced Reconnaissance and Network Scanning
Enumeration

3 Module 3 Interview Preparation

Module 3 Mini Project:


4
Information Gathering On Websites using Linux

5 Cyber Security Tools Certificate


INTERNSHIP PROGRAM CURRICULUM I 15

Secure Development
Week 9 Methodologies and Cyber Security

Backing Your Security into Systems

Penetrate and Patch Approach

Holistic Approach to Application Security

Need of Cybersecurity

CIA Triad

Security Architecture

Security Governance

Security Auditing

Week 10 Ethical Hacking

Ethical Hacking Concepts and Scope

Information Security Controls

Types of Security Policies

Physical Security

Incident Management

Vulnerability Assessment

Penetration Testing

Information Security Laws and Standards


INTERNSHIP PROGRAM CURRICULUM I 16

Anonymity and Information


Week 11 Gathering

Proxies
Proxychains
Footprinting Concepts
Footprinting Methods
Maltego Tool Overview

Advanced Reconnaissance
Week 12 and Network Scanning

Recon-ng Overview
FOCA Tool Overview
Overview of Network Scanning
Hping Commands
Xmas Scanning
Creating Network Topology Map using Tool

Week 13 Enumeration

Enumeration Concepts
Techniques for Enumeration
Services Enumeration using Nmap
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
INTERNSHIP PROGRAM CURRICULUM I 17

Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 18

Module 3 Mini Project


Information Gathering On Websites using Linux

Cyber Security Tools Certificate


upon completion of this project
INTERNSHIP PROGRAM CURRICULUM I 19

MODULE 4

1 Web Application Hacking

Vulnerability Analysis and Introduction to


Web Application Hacking
2 Advanced Web Application Hacking
SQL Injection and Tools
Session Hijacking and OWASP Part 2
OWASP Part 3 and Social Engineering

3 Module 4 Interview Preparation

Module 4 Mini Project


4
CTF (Capture The Flag) Challenge

5 Web Application Hacking Certificate


INTERNSHIP PROGRAM CURRICULUM I 20

Vulnerability Analysis & Introduction


Week 14 to Web Application Hacking

Vulnerability Assessment Life-Cycle

Vulnerability Assessment Solutions

Vulnerability Scoring Systems

Web Server Security Issue

Web server Attacks

Attack Methodology

Week 15 Advanced Web Application Hacking

DDOS

Web Application Concepts

Web App Hacking Methodology


LDAP Injection and CRLF Injection

Cross-Site Scripting

Broken Authentication
INTERNSHIP PROGRAM CURRICULUM I 21

Week 16 SQL Injection and Tools

Introduction to SQL injection


SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
Blind SQL Injection
Validating and Escaping Inputs

Week 17 Session Hijacking and OWASP Part 2

Session Hijacking Techniques


Application Level Session Hijacking
Network-level Session Hijacking
XML External Entities(XXE)
Broken Access Control

Week 18 OWASP Part 3 and Social Engineering

Cross-Site Scripting (XSS)


Insecure Decentralization
Using Components with Known Vulnerabilities
Social Engineering Concepts
Social Engineering Techniques
Impersonation on Social Networking Sites
INTERNSHIP PROGRAM CURRICULUM I 22

Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 23

Module 4 Mini Project


CTF (Capture The Flag) Challenge

Web Application Hacking Certificate


upon completion of this project
INTERNSHIP PROGRAM CURRICULUM I 24

Which tools and technologies


will we be using?
INTERNSHIP PROGRAM CURRICULUM I 25

Industry-Grade Project

Ethically Hack an Amazon-like


E-Commerce Website
Perform Penetration testing on an E-Commerce website
like Amazon using Kali Linux, Burp Suite, Recon-ng
framework, etc to discover hidden flags and vulnerabilities.
INTERNSHIP PROGRAM CURRICULUM I 26

Evaluations:

After completion of course, final evaluations


are conducted:

1 Final project submission. (Industry grade project)

2 Final project evaluation

Mock Interview round conducted by a Cyber Security


3 & Ethical Hacking Industry Expert.
INTERNSHIP PROGRAM CURRICULUM I 27

Certifications:

You will get one of the three certificates based


on your performance in evaluation:

Course Completion Certificate


1 (Final evaluation is NOT mandatory)
INTERNSHIP PROGRAM CURRICULUM I 28

Certifications:

Internship Certificate
2 (Final evaluation is mandatory)
INTERNSHIP PROGRAM CURRICULUM I 29

Certifications:

Super Intern Certificate


3 (Final evaluation is mandatory)
INTERNSHIP PROGRAM CURRICULUM I 30

Placement Assistance:

1 Resume Building

2 Personality skill development session

Increasing online visibility on platforms like


3 linkedin, naukri, etc.

4 Additional Interview Preparation study Material

Placement assistance by referring to Edureka’s


5 Partner Hiring Companies
Thank you!

Cyber Security & Ethical Hacking


Internship Program Curriculum

You might also like