Cyber Security Ethical Hacking Internship Program - Curriculum
Cyber Security Ethical Hacking Internship Program - Curriculum
CONTENT
MODULE 1
Operating Systems & Networking Fundamentals
Linux Fundamentals
Tools in Kali Linux and System Security
OS Security and Basics of Networking
Network Security and Protocols
Module 1 Interview Preparation
Module 1 Mini Project: Secure User Access
Management in Linux 03
MODULE 2
Cryptography and Application Security
Cryptography and Access Control
Session Management and Web Security
Web Technologies and Database Security
File Security and Mobile Security
Module 2 Interview Preparation
Module 2 Mini Project: Web Application Source
Code Vulnerability Analysis 09
MODULE 3
Cyber Security Tools
Secure Development Methodologies and Cyber Security
Ethical Hacking
Anonymity and Information Gathering
Advanced Reconnaissance and Network Scanning
Enumeration
Module 3 Interview Preparation
Module 3 Mini Project: Information Gathering
On Websites using Linux 14
INTERNSHIP PROGRAM CURRICULUM I 02
MODULE 4
Web Application Hacking
Vulnerability Analysis and Introduction to Web Application Hacking
Advanced Web Application Hacking
SQL Injection and Tools
Session Hijacking and OWASP Part 2
OWASP Part 3 and Social Engineering
Module 4 Interview Preparation
Module 4 Mini Project: CTF (Capture The Flag) Challenge 19
CERTIFICATES 27
PLACEMENT ASSISTANCE 30
INTERNSHIP PROGRAM CURRICULUM I 03
MODULE 1
Linux Fundamentals
2 Tools in Kali Linux and System Security
OS Security and Basics of Networking
Network Security and Protocols
History of Linux
Linux Distributions
Linux Architecture
CIA Triad
Security Problems
OS Security and
Week 3 Basics of Networking
User Authentication
Network Topologies
Network Security
Week 4 and Protocols
TCP/IP Model
Addressing
Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 08
MODULE 2
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Thinking Like a Defender
Input Validation
Attack Surface Reduction
Classifying and Prioritizing Threat
Fundamentals of Authentication
Authorization using Access Control
ActiveX
Cookies Awareness
CGI Script
FTP Security
LDAP
Evasion Techniques
Using IBM Security AppScan Standard
SQL Injection Effects on CIA Triad
Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 13
MODULE 3
Secure Development
Week 9 Methodologies and Cyber Security
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Physical Security
Incident Management
Vulnerability Assessment
Penetration Testing
Proxies
Proxychains
Footprinting Concepts
Footprinting Methods
Maltego Tool Overview
Advanced Reconnaissance
Week 12 and Network Scanning
Recon-ng Overview
FOCA Tool Overview
Overview of Network Scanning
Hping Commands
Xmas Scanning
Creating Network Topology Map using Tool
Week 13 Enumeration
Enumeration Concepts
Techniques for Enumeration
Services Enumeration using Nmap
SNMP Enumeration
LDAP Enumeration
NTP Enumeration
INTERNSHIP PROGRAM CURRICULUM I 17
Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 18
MODULE 4
Attack Methodology
DDOS
Cross-Site Scripting
Broken Authentication
INTERNSHIP PROGRAM CURRICULUM I 21
Interview Preparation
Operating Systems and Networking Fundamentals
INTERNSHIP PROGRAM CURRICULUM I 23
Industry-Grade Project
Evaluations:
Certifications:
Certifications:
Internship Certificate
2 (Final evaluation is mandatory)
INTERNSHIP PROGRAM CURRICULUM I 29
Certifications:
Placement Assistance:
1 Resume Building