Computernetworkingandcybersecurity
Computernetworkingandcybersecurity
NETWORKING BASICS
Network Theory
Network Communica ons Methods
Network Media and Hardware
Bounded Network Media
Unbounded Network Media
Noise Control
Network Connec vity Devices
Network Implementa ons
Ethernet Networks
Wireless Networks
The OSI Model
The TCP/IP Model
TCP/IP Addressing and Data Delivery
The TCP/IP Protocol Suite
IP Addressing
Default IP Addressing Schemes
Create Custom IP Addressing Schemes
Implement IPv6 Addresses
Delivery Techniques
TCP/IP Services
Assign IP Addresses
Domain Naming Services
TCP/IP Commands
Common TCP/IP Protocols
TCP/IP Interoperability Services
LAN Infrastructure
Switching
Enable Sta c Rou ng
Implement Dynamic IP Rou ng
Plan a SOHO Network
CCNA
Network Fundamentals
l Explain the role and func on of network components
l Routers
l L2 and L3 switches
l Next-genera on firewalls and IPS
l Access points
l Controllers (Cisco DNA Center and WLC)
l Endpoints
l Servers
Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol
and identify basic operations
l Root port, root bridge (primary/secondary), and other port names
l Port states (forwarding/blocking)
l PortFast benefits
Compare Cisco Wireless Architectures and AP modes
Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk
ports, and LAG)
Compare Cisco Wireless Architectures and AP modes
Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk
ports, and LAG)
Describe AP and WLC management access connections (Telnet, SSH, HTTP, HTTPS, console,
and TACACS+/RADIUS)
Configure the components of a wireless LAN access for client connectivity using GUI only
such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
3.0 IP Connectivity
Interpret the components of routing table
l Rou ng protocol code
l Prefix
l Network mask
l Next hop
l Administra ve distance
l Metric
l Gateway of last resort
Determine how a router makes a forwarding decision by default
l Longest match
l Administra ve distance
l Rou ng protocol metric
MICROSOFT SERVER-2016/2019
Implement Domain Name System (DNS)
Install and configure DNS servers
This objective may include but is not limited to: Determine DNS installation requirements; install DNS;
configure forwarders; configure Root Hints; configure delegation; implement DNS policies; Configure
DNS Server settings using Windows PowerShell; configure Domain Name System Security Extensions
(DNSSEC); configure DNS Socket Pool; configure cache locking; enable Response Rate Limiting;
configure DNS-based Authentication of Named Entities (DANE); configure DNS logging; configure
delegated administration; configure recursion settings; implement DNS performance tuning; configure
global settings
Create and configure DNS zones and records
This objective may include but is not limited to: Create primary zones; configure Active Directory primary
zones; create and configure secondary zones; create and configure stub zones; configure a GlobalNames
zone; analyze zone-level statistics; create and configure DNS Resource Records (RR), including A, AAAA,
PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options,
including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates;
configure unknown record support; use DNS audit events and analytical (query) events for auditing
and troubleshooting; configure Zone Scopes; configure records in Zone Scopes; configure policies
for zones
Create and configure DNS zones and records
This objective may include but is not limited to: Create primary zones; configure Active Directory primary
zones; create and configure secondary zones; create and configure stub zones; configure a GlobalNames
zone; analyze zone-level statistics; create and configure DNS Resource Records (RR), including A, AAAA,
PTR, SOA, NS, SRV, CNAME, and MX records; configure zone scavenging; configure record options,
including Time To Live (TTL) and weight; configure round robin; configure secure dynamic updates;
configure unknown record support; use DNS audit events and analytical (query) events for auditing
and troubleshooting; configure Zone Scopes; configure records in Zone Scopes; configure policies
for zones
Implement DHCP and IPAM
Install and configure DHCP
This objective may include but is not limited to: Install and configure DHCP servers; authorize a DHCP
server; create and configure scopes; create and configure superscopes and multicast scopes; configure
a DHCP reservation; configure DHCP options; configure DNS options from within DHCP; configure
policies; configure client and server for PXE boot; configure DHCP Relay Agent; implement IPv6
addressing using DHCPv6; perform export and import of a DHCP server; perform DHCP server migration
Manage and maintain DHCP
This objective may include but is not limited to: Configure a lease period; back up and restore the
DHCP database; configure high availability using DHCP failover; configure DHCP name protection;
troubleshoot DHCP
Implement and Maintain IP Address Management (IPAM)
This objective may include but is not limited to: Provision IPAM manually or by using Group Policy;
configure server discovery; create and manage IP blocks and ranges; monitor utilization of IP address
space; migrate existing workloads to IPAM; configure IPAM database storage using SQL Server;
determine scenarios for using IPAM with System Center Virtual Machine Manager for physical and
virtual IP address space management, Manage DHCP server properties using IPAM; configure DHCP
scopes and options; configure DHCP policies and failover; manage DNS server properties using IPAM;
manage DNS zones and records; manage DNS and DHCP servers in multiple Active Directory forests;
delegate administration for DNS and DHCP using role-based access control (RBAC); Audit the changes
performed on the DNS and DHCP servers; audit the IPAM address usage trail; audit DHCP lease events
and user logon events
Implement Network Connectivity and Remote Access Solutions
Implement network connectivity solutions
This objective may include but is not limited to: Implement Network Address Translation (NAT);
configure routing
AWS
1. Introduction to Cloud Computing: In this module, you will learn what Cloud
Computing is and what are the different models of Cloud Computing along with the
key differentiators of different models. We will also introduce you to virtual world of
AWS along with AWS key vocabulary, services and concepts.
· Introduction to Cloud Computing
· AWS Architecture
· AWS Management Console
· Setting up of the AWS Account
2. Amazon EC2 and Amazon EBS: In this module, you will learn about the
introduction to compute offering from AWS called EC2. We will cover different
instance types and Amazon AMIs. A demo on launching an AWS EC2 instance,
connect with an instance and hosting a website on AWS EC2 instance. We will also
cover EBS storage Architecture (AWS persistent storage) and the concepts of AMI
and snapshots.
· Amazon EC2
· Amazon EBS
· Demo of AMI Creation
· Backup, Restore
3. Amazon Storage Services S3 (Simple Storage Services): In this module, you will
learn how AWS provides various kinds of scalable storage services. In this module,
we will cover different storage services like S3, Glacier, Versioning, and learn how to
host a static website on AWS.
4. Cloud Watch & SNS: In this modules, you will learn how to monitoring AWS
resources and setting up alerts and notifications for AWS resources and AWS usage
billing with AWS CloudWatch and SNS.
· Amazon Cloud Watch
· SNS - Simple Notification Services
5. Scaling and Load Distribution in AWS: In this module, you will learn about
'Scaling' and 'Load distribution techniques' in AWS. This module also includes a
demo of Load distribution & Scaling your resources horizontally based on time or
activity.
· Amazon Auto Scaling & ELB
6. AWS VPC & Route 53: In this module, you will learn introduction to Amazon
Virtual Private Cloud. We will cover how you can make public and private subnet
with AWS VPC. A demo on creating VPC. We will also cover overview of AWS
Route 53.
· Amazon VPC with subnets
· Gateways
· Route Tables
· Amazon Route 53 overview
7. Identity and Access Management Techniques (IAM): In this module, you will
learn how to achieve distribution of access control with AWS using IAM.
· Amazon IAM - add users to groups, manage passwords, log in with IAM -created
users.
8. Amazon Relational Database Service (RDS): In this module, you will learn how to
manage relational database service of AWS called RDS.
· Amazon RDS
9. Multiple AWS Services and Managing the Resources' Lifecycle: In this module,
you will get an overview of multiple AWS services. We will talk about how do you
manage life cycle of AWS resources and follow the DevOps model in AWS. We will
also talk about notification and email service of AWS along with Content Distribution
Service in this module.
· AWS CloudFront , Cloud Trail, SQS
· Overview of AWS Products such as Elastic Beanstalk, AWS DynamoDB
Cloud Formation, SES.
10. AWS Architecture and Design: In this module, you will cover various architecture
and design aspects of AWS. We will also cover the cost planning and optimization
techniques along with AWS security best practices, High Availability (HA) and
Disaster Recovery (DR) in AWS.
· AWS Backup and DR Setup
· AWS High Availability Design
· AWS Best Practices (Cost +Security)
· AWS Calculator & Consolidated Billing
11. Migrating to Cloud & AWS: In this module, you will learn how to migrate to cloud.
Amazon Web Services Certifications Training.
BASIC PYTHON
Introduc on To Python
Why Python
Applica on areas of python
Python implementa ons
Cpython
Jython
Ironpython
Pypy
Python versions
Installing python
Python interpreter architecture
Python byte code compiler
Python virtual machine(pvm)
Wri ng and Execu ng First Python Program
Using interac ve mode
Using script mode
General text editor and command window
Idle editor and idle shell
Understanding print() func on
How to compile python program explicitly
Python Language Fundamentals
Character set
Keywords
Comments
Variables
Literals
Operators
Reading input from console
Parsing string to int, float
Python Condi onal Statements
If statement
If else statement
If elif statement
If elif else statement
Nested if statement
Looping Statements
While loop
For loop
Nested loops
Pass, break and con nue keywords
Standard Data Types
Int, float, complex, bool, nonetype
Str, list, tuple, range
Dict, set, frozenset
String Handling
What is string
String representa ons
Unicode string
String func ons, methods
String indexing and slicing
String forma ng
Python List
Crea ng and accessing lists
Indexing and slicing lists
List methods
Nested lists
List comprehension
Python Tuple
Crea ng tuple
Accessing tuple
Immutability of tuple
Python Set
How to create a set
Itera on over sets
Python set methods
Python frozenset
Python Dic onary
Crea ng a dic onary
Dic onary methods
Accessing values from dic onary
Upda ng dic onary
Itera ng dic onary
Dic onary comprehension
Python Func ons
Defining a func on
Calling a func on
Types of func ons
Func on arguments
Posi onal arguments, keyword arguments
Default arguments, non-default arguments
Arbitrary arguments, keyword arbitrary arguments
Func on return statement
Nested func on
Func on as argument
Func on as return statement
Decorator func on
Closure
Map(), filter(), reduce(), any() func ons
Anonymous or lambda func on
Modules & Packages
Why modules
Script v/s module
Impor ng module
Standard v/s third party modules
Why packages
Understanding pip u lity
File I/O
Introduc on to file handling
File modes
Func ons and methods related to file handling
Understanding with block
Regular Expressions(Regex)
Need of regular expressions
Re module
Func ons /methods related to regex
Meta characters & special sequences
Object Oriented Programming
Procedural v/s Object Oriented Programming
OOP Principles
Defining a Class & Object Crea on
Inheritance
Encapsula on
Polymorphism
Abstrac on
Garbage Collec on
Iterator & Generator
Excep on Handling
Difference Between Syntax Errors and Excep ons
Keywords used in Excep on Handling
try , except , finally , raise , assert
Types of Except Blocks
User-defined Excep ons
GUI Programming
Introduc on to Tkinter Programming
Tkinter Widgets
Layout Managers
Event handling
Displaying image
Mul Threading Programming
Mul -processing v/s Mul -threading
Need of threads
Crea ng child threads
Func ons /methods related to threads
Thread synchroniza on and locking
ETHICAL HACKING
Introduction to Ethical Hacking
l Information Security Overview
l Information Security Threats and Attack Vectors
l Top Information Security Attack Vectors
l Motives, Goals, and Objectives of Information Security Attacks
l Information Security Threats
l Information Warfare
l Hacking Concepts
l Hacking vs. Ethical Hacking
l Effects of Hacking on Business
l Who Is a Hacker?
l Hacker Classes
l Hacktivism
l Hacking Phases
l Types of Attacks
l Types of Attacks on a System
l Operating System Attacks
l Misconfiguration Attacks
l Application-Level Attacks
l Skills of an Ethical Hacker
l Defense in Depth
l Incident Management Process
l Information Security Policies
l Classification of Security Policies
l Structure and Contents of Security Policies
Scanning Networks
l Check for Live Systems
l Checking for Live Systems - ICMP Scanning
l Ping Sweep
l Check for Open Ports
l Scanning Tool: Nmap
l Hping2 / Hping3
l Scanning Techniques
l Scanning Tool: NetScan Tools Pro
l Scanning Tools
l Do Not Scan These IP Addresses
(Unless you want to get into trouble)
l Port Scanning Countermeasures
l Banner Grabbing Countermeasures
Disabling or Changing Banner
l Hiding File Extensions from Web Pages
l Scan for Vulnerability
l Proxy Servers
l Why Attackers Use Proxy Servers?
l Use of Proxies for Attack
Enumeration
l What is Enumeration?
l Techniques for Enumeration
l Services and Ports to Enumerate
l NetBIOS Enumeration
l NetBIOS Enumeration
l NetBIOS Enumeration Tool:SuperScan
l NetBIOS Enumeration Tool: Hyena
l NetBIOS Enumeration Tool:Winfingerprint
l NetBIOS Enumeration Tool:NetBIOS Enumerator
l Enumerating User Accounts
System Hacking
l Information at Hand Before System Hacking Stage
l System Hacking: Goals
l CEH Hacking Methodology (CHM)
l CEH System Hacking Steps
l CrackingPasswords
l Password Cracking
l Password Complexity
l Password Cracking Techniques
l Types of Password Attacks
l Distributed Network Attack
l Default Passwords
l Manual Password Cracking (Guessing)
l Stealing Passwords Using Keyloggers
l Spyware
l How to Defend Against Keyloggers
l Anti-Spywares
l What Is Steganography?
l Least Significant Bit Insertion
Sniffers
l Sniffing Concepts
l Wiretapping
l Lawful Interception
l Packet Sniffing
l Sniffing Threats
l SPAN Port
l MAC Attacks
l MAC Flooding
l MAC Address/CAM Table
l How CAM Works
l DHCP Attacks
l How DHCP Works
l DHCP Request/Reply Messages
l IPv4 DHCP Packet Format
l ARP Poisoning
l What Is Address Resolution Protocol(ARP)?
l ARP Spoofing Techniques
l ARP Spoofing Attack
l Spoofing Attack
l Spoofing Attack Threats
l DNS Poisoning
l DNS Poisoning Techniques
Social Engineering
l Social Engineering Concepts
l What is Social Engineering?
l Behaviors Vulnerable to Attacks
l Social Engineering Techniques
l Types of Social Engineering
l Human-based Social Engineering
l Technical Support Example
l Authority Support Example
l Social Networking Sites
l Social Engineering Through
l Impersonation on Social
l Networking Sites
l How to Detect Phishing Emails
l Anti-Phishing Toolbar: Netcraft
l Anti-Phishing Toolbar: PhishTank
l Identity Theft Countermeasures
Denial of Service
l DoS/DDoS Concepts
l What is a Denial of Service Attack?
l What Are Distributed Denial ofService Attacks?
l Symptoms of a DoS Attack
l DoS Attack Techniques
l Bandwidth Attacks
l Service Request Floods
l SYN Attack
l SYN Flooding
l ICMP Flood Attack
l Peer-to-Peer Attacks
l Permanent Denial-of-Service Attack
l Application Level Flood Attacks
l Botnet
l Botnet Propagation Technique
l DDoS Attack
l DDoS Attack Tool:LOIC
l DoS Attack Tools
Session Hijacking
l Session Hijacking Concepts
l What is Session Hijacking?
l Dangers Posed by Hijacking
l Why Session Hijacking is Successful?
l Key Session Hijacking Techniques
l Brute Forcing Attack
l Network-level Session Hijacking
l The 3-Way Handshake
l Sequence Numbers
l Session Hijacking Tools
l Session Hijacking Tool: Zaproxy
l Session Hijacking Tool: Burp Suite
l Session Hijacking Tool: JHijack
l Session Hijacking Tools
Hacking Webservers
l Webserver Concepts
l Webserver Market Shares
l Open Source WebserverArchitecture
l Attack Methodology
l Webserver Attack Methodology
l Webserver Attack Methodology:Information Gathering
l Webserver Attack Methodology:Webserver Footprinting
l Counter-measures
l Countermeasures: Patches and Updates
l Countermeasures: Protocols
l Countermeasures: Accounts
l Countermeasures: Files and Directories
l How to Defend Against Web Server Attacks
l How to Defend against HTTP
l Response Splitting and Web Cache
l Poisoning
l Web Server Penetration Testing
SQL Injection
l SQLInjection Concepts
l SQL Injection
l Scenario
l SQL Injection Threats
l What is SQL Injection?
l SQL Injection Attacks
l SQL Injection Detection
l Types of SQL Injection
l Simple SQL Injection Attack
l Union SQL Injection Example
l SQL Injection Error Based
l Blind SQL Injection
l What is Blind SQL Injection?
l SQL Injection Methodology
l Advanced SQL Injection
l Information Gathering
l Extracting Information through ErrorMessages
l Interacting with the FileSystem
l SQL Injection Tools
l SQL Injection Tools: BSQLHacker
l SQL Injection Tools: Marathon Tool
l SQL Injection Tools: SQL PowerInjector
l SQL Injection Tools: Havij
l SQL Injection Tools
Cryptography
l Cryptography Concepts
l Cryptography
l Types of Cryptography
l Government Access to Keys (GAK)
l Encryption Algorithms
l Ciphers
l Advanced Encryption Standard (AES)
l Public Key Infrastructure(PKI)
l Public Key Infrastructure (PKI)Certification Authorities
l Email Encryption
l Digital Signature
l SSL (Secure Sockets Layer)
l Transport Layer Security (TLS)
l Disk Encryption Tools
l Cryptanalysis Tool: CrypTool
l Cryptanalysis Tools
l Online MD5 Decryption Tool
Penetration Testing
l Pen Testing Concepts
l Security Assessments
l Security Audit
l Vulnerability Assessment
l Limitations of Vulnerability Assessment
l Introduction to Penetration Testing
l Penetration Testing
l Why Penetration Testing?
l Testing Locations
l Types of Pen Testing
l Types of Penetration Testing
l External Penetration Testing
l Internal Security Assessment
l Black-box Penetration Testing
l Grey-box Penetration Testing
l White-box Penetration Testing
CYBER SECURITY
Introduction to Cybercrime
l Definition and History
l Cybercrime and Information Security
l Who are Cybercriminals and their classifications
l The Legal Perspectives
l An Indian Perspective
l Cybercrime and the Indian ITAct 2000
l A Global Perspective on Cybercrimes
l Survival for the Netizens
l Concluding Remarks and Way Forward to Further Chapters
Cyberoffenses
l How Criminals Plan the Attacks
l Social Engineering
l Cyberstalking
l Cybercafe and Cybercrimes
l Botnets
l Attack Vector
l Cloud Computing
Cybercrime and Wireless Devices
l Proliferation of Mobile and Wireless Devices
l Trends in Mobility
l Credit Card Frauds in Mobile and Wireless Computing Era
l Security Challenges Posed by Mobile Devices
l Registry Settings for Mobile Devices
l Authentication Service Security
l Attacks on Mobile/Cell Phones
l Security Implications for Organizations
l Organizational Measures for Handling Mobile
l Organizational Security Policies and Measures in Mobile Computing Era
l Laptops
Tools and Methods Used in Cybercrime
l Proxy Servers and Anonymizers
l Phishing
l Password Cracking
l Keyloggers and Spywares
l Virus and Worms
l Trojan Horses and Backdoors
l Steganography
l DoS and DDoS Attacks
l SQL Injection
l Buffer Overflow
l Attacks on Wireless Networks
Phishing and Identity Theft
l Phishing
l Identity Theft (ID Theft)
The Legal Perspectives
l Cybercrime and the Legal Landscape around the World
l Cyberlaws in India
l The Indian IT Act
l Challenges to Indian Law and Cybercrime Scenario in India
l Consequences of Not Addressing the Weakness in Information Technology Act
l Digital Signatures and the Indian IT Act
l Amendments to the Indian IT Act
l Cybercrime and Punishment
Computer Forensics
l Historical Background of Cyberforensics
l Digital Forensics Science
l The Need for Computer Forensics
l Cyberforensics and Digital Evidence
l Forensics Analysis of E-Mail
l Digital Forensics Life Cycle
l Chain of Custody Concept
l Network Forensics
l Approaching a Computer Forensics Investigation
l Setting up a Computer Forensics Laboratory
l Computer Forensics and Steganography
l Relevance of the OSI 7 Layer Model to Computer Forensics
l Forensics and Social Networking Sites
l Computer Forensics from Compliance Perspective
l Challenges in Computer Forensics
l Special Tools and Techniques
l Forensics Auditing
l Antiforensics
Forensics of Hand-Held Devices
l Understanding Cell Phone Working Characteristics
l Hand-Held Devices and Digital Forensics
l Toolkits for Hand-Held Device Forensics
l Forensics of iPods and Digital Music Devices
l An Illustration on Real Life Use of Forensics
l Techno-Legal Challenges with Evidence from Hand-Held Devices
l Organizational Guidelines on Cell Phone Forensics
Cybersecurity and Organizations
l Cost of Cybercrimes and IPR Issues
l Web Threats for Organizations
l Security and Privacy Implications from Cloud Computing
l Social Media Marketing
l Social Computing and the Associated Challenges for Organizations
l Protecting People's Privacy in the Organization
l Organizational Guidelines for Internet Usage
l Safe Computing Guidelines and Computer Usage Policy
l Incident Handling
l Forensics Best Practices for Organizations
l Media and Asset Protection
l Importance of Endpoint Security in Organizations
Cybercrime and Cyberterrorism
l Intellectual Property in the Cyberspace
l The Ethical Dimension of Cybercrimes
l The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
l Sociology of Cybercriminals
l Information Warfare
+91 7042175774
+91 9810851363