0% found this document useful (0 votes)
77 views3 pages

Cyber Security Engineer

Report on cyber security internship

Uploaded by

ramjikancharla24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views3 pages

Cyber Security Engineer

Report on cyber security internship

Uploaded by

ramjikancharla24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity

Introduction to Cybersecurity & Ethical Hacking


Topics:
 Need of Cybersecurity
 CIA Triad
 Security Architecture
 Security Governance
 Security Auditing
 Regulations & Frameworks
 Ethical Hacking
 Types of Hackers
 Phases of Ethical Hacking
 Penetration Testing
 Types of Penetration Testing
 Footprinting
 Objectives of Footprinting
 Types of Footprinting
 Footprinting Techniques

Cryptography
Topics:
 Types of cryptography
 Symmetric cryptography Asymmetric cryptography Hash functions
 Digital signatures
 Public Key Infrastructure (PKI) Attacks on cryptosystems

Computer Networks & Security


Topics
 Introduction to Computer Network
 Computer Networks - Architecture
 Layered architecture
 Open Systems Interconnect (OSI) Model
 Transmission Control Protocol/Internet Protocol (TCP/IP) Network
Scanning
 Enumeration
 Common Network Threats/Attacks

Application and Web Security


Topics:
 Web server architecture
 Web server attacks
 Countermeasures and patch management
 Web application architecture
 Web application attacks

IdAM (Identity and Access Management)

Topics:

 Authentication and authorization


 Authentication and authorization principles
 Regulation of access
 Access administration
 IdAM
 Password protection
 Identity theft

Vulnerability Analysis & System Hacking


Topics:
Vulnerability Analysis
Types of Vulnerability Analysis
Vulnerability Assessment Lifecycle
Vulnerability Assessment Tools
Vulnerability Scoring Systems
Vulnerability Assessments Report
System Hacking
Password Cracking
Privilege escalation
Executing Applications
Hiding Files
Clearing Logs

Sniffing and SQL Injection


Topics:
 Malware and its propagation ways
 Malware components
 Types of malware
 Concept of sniffing
 Types of sniffing
 Types of sniffing attacks
 SQL injection
 Types of SQL injection
 SQL injection Methodologies

DoS and Session Hijacking


Topics:
 DoS attack DDoS attack
 Common symptoms of DoS/DDoS attack
 Categories of DoS/DDoS Attack Vectors
 DoS/DDoS detection techniques
 Session hijacking
 Application level session hijacking
 Network level session hijacking
 Intrusion Detection System (IDS)
 Types of Intrusion Detection Systems
 Introduction to Firewalls
 Types of Firewalls Introduction to Honeypots
 Evading IDS

You might also like