0% found this document useful (0 votes)
36 views13 pages

Refonte Learning Cyber Security Program

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views13 pages

Refonte Learning Cyber Security Program

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

E-Learning Providers

WELCOME TO REFONTE LEARNING

We are a leading IT company specializing in data analytics. We're excited to


unveil our newest data analytics cohort, representing our continuous efforts
since 2016 to develop a cutting-edge scientific trading robot based on
Artificial Intelligence for the crypto currency futures market.

Enroll Now

https://refontelearning.com
REFONTE INTERNATIONAL
TRAINING AND INTERNSHIP
PROGRAM (RITIP)
Our programs span across various sectors, affording you exposure to a

wide array of opportunities within your chosen field. Armed with hands-

on experience and a robust professional network, you'll be poised for a

fulfilling career.

At Refonte Learning, we are committed to transforming the education-

to-employment journey. Our virtual internship initiative serves as a

conduit to practical experience, empowering you to acquire essential

skills and industry insights in a remote environment.

ABOUT REFONTE INFINI


We are a leading IT company specializing in data analytics.
We're excited to unveil our newest data analytics cohort,
representing our continuous efforts since 2016 to develop a
cutting-edge scientific trading robot based on Artificial
Intelligence for the crypto currency futures market.

https://refontelearning.com
Program Eligibility Criteria and
Application Process

Eligibility Criteria:

Currently pursuing a Bachelor's degree or any higher


qualification.
Weekly Time Commitment: 12-14 hours per week.
Duration: 3 months.

STEP 3
STEP 1 Start Learning
Register
Your learning journey
Sign up and apply to Pay the course fees to begins immediately
the course/program enroll and secure your with the next
you're interested In spot. upcoming cohort!.

https://refontelearning.com
Key Distinctive Program
Features

Expert-led
Certificate of Program Cybersecurity
Completion issued by Masterclasses
Refonte Learning

Refonte Career Services


aids in elevating your
visibility to hiring firms.

Acquire practical
experience through a
capstone project.

Accessing integrated
labs through
Refonte's LMS.

https://refontelearning.com
Connect with an Admission
Counselor
We offer a team of committed admission counselors ready to assist you
throughout the application process and address any related inquiries.
They are available to:

Respond to inquiries regarding the application.

Aid in resolving your queries.

Facilitate understanding of the program.

https://refontelearning.com
Visualization of Learning
Paths

01 Ethical Hacking

02 Vulnerability Assessment

03 Penetration Testing

Capstone Project

https://refontelearning.com
Who Would Benefit from
Enrolling in this Program?
This program is tailored for individuals aspiring to enter
the cybersecurity field or seeking to enhance their skills.
It is designed to accommodate diverse professional
backgrounds. While there are no specific prerequisites
for enrollment, individuals in the following roles and
disciplines would find this course particularly beneficial:

 Information Security  Network Security


Analyst Operations
 Security Analyst  Application Security
 Certified Ethical Hacker Vulnerability
 Security Consultant  Cyber Penetration Testing
 Information Security Engineer
Manager  Cybersecurity Application
 Penetration Tester Engineer
 Vulnerability Tester  Security Architect
 Vulnerability Assessment  Security Administrator
Analyst  Pentest Security Engineer

https://refontelearning.com
ETHICAL HACKING
In this course, you'll delve deeper into the concepts, implications,
distinctions, and constraints of ethical hacking. You'll play a pivotal role
in aiding organizations to implement novel hack-prevention strategies
and technologies aimed at shielding systems from potential hacker
intrusions.

Key Learning Objectives:

 Gain proficiency in utilizing online open-source intelligence tools for passive


reconnaissance.
 Execute foot printing and reconnaissance, which are pivotal stages in the ethical
hacking process, employing the latest methodologies and technologies.
 Master various scanning techniques utilizing NMAP and NPING, and perform
scanning on the target network beyond the purview of Intrusion Detection
Systems (IDS) and firewalls.
 Comprehend the functioning of web applications and web servers, identify their
vulnerabilities, and learn preventive measures against potential attacks.

COURSE CURRICULUM

Introduction to Ethical Hacking Scanning Networks

Ethical Hacking Network Scanning Concepts


Concepts & Outcome Scanning Tools
Differences & Limitations Port Scanning Techniques
IDS/Firewall Evasion
Techniques
Banner Grabbing
Malware Draw Network Diagram

Malware Concepts Footprinting & Reconnaissance


Viruses and Worms
Trojans
Malware Analysis Introduction to MReconnaissance
Anti-Malware Software Passive Reconnaissance
Active Reconnaissance
Counter Measures

https://refontelearning.com
Social Engineering
Enumeration

Social Engineering Concepts


What is Enumeration Social Engineering Attacks
LDAP Enumeration Insider Threats
NetBIOS Enumeration Social Networking Sites
DNS Enumeration Identity Theft
Enumeration Defence Assisted Demo:
 Getting Email IDs
 Available in the Public Domain
using the Harvester

Enumeration

System Hacking

Sniffing Concepts
Sniffing Techniques
 MAC Attack System Hacking Introduction
 ARP Positioning Password Cracking
 Spoofing Attack Privileged Escalation
 DNS Poisoning Executing Applications
Sniffing Tools Data Hiding
Defending and Covering Tracks
Countermeasures
Techniques Against Sniffing

Denial of Service
Vulnerability Identification &
Exploit Selection

DoS/DDoS Concepts
DoS/DDoS Attack Techniques
Vulnerability Assessment
Vulnerability Assessment
Solutions
Vulnerability Scoring System
Exploit DB SQL Injection

SQL Injection Concepts


Session Hijacking Types of SQL Injection

Session Hijacking Concepts


Application-level Session

https://refontelearning.com
Hacking Mobile Platforms & IoT
Hacking Wireless Networks

Hacking Wireless Networks Mobile Platform Hacking


Concepts and Terminology Countermeasures
Wireless Encryption Mobile Attacks
Wireless Hacking Improving Mobile Security
Wireless Attacks IoT Concepts
Wireless Encryption Attacks IoT Technology Protocols
Protecting Wireless Networks IoT Operating Systems
Countermeasures

Cloud Computing
Evading IDS, Firewalls, and
Honeypots

Cloud Computing Concepts


Cloud Computing Threats IDS/IPS - Basic Concepts
Cloud Computing Attacks Firewalls - Basic Concepts
Cloud Security Control Layers Honeypots
Cloud Security Tools How to Detect a Honeypot

Hacking Web Servers Hacking Web Servers

Webserver Concepts
Web Server Attack Cryptography Concepts
Methodologies Encryption Algorithms
Web Server Attacks Hashes
Patch Management Public Key Infrastructure
Web Server Security Disk Encryption
Email Encryption
Cryptonalysis
Countermeasures

Hacking Web Allocations

Web Allocation Concepts


Web A Threats
Hacking Methodologies
Hacking Tools
Countermeasures

https://refontelearning.com
Vulnerability Assessment
Throughout this course, you'll develop the skills to systematically analyze
security weaknesses within information systems. You'll assess whether the
system is vulnerable to any known vulnerabilities, evaluate the severity of
these vulnerabilities, and provide recommendations for mitigation or risk
management as needed.

Key Learning Objectives:


 Develop a secure system and acquire expertise in vulnerability assessment
and reconnaissance principles to safeguard both your infrastructure and
online presence.
 Employ practical exploits to evaluate their impact on your systems
effectively.
 Conduct a risk assessment and engage in threat modeling for web
application architecture.
 Formulate an effective strategy for managing vulnerabilities to ensure
success.
COURSE CURRICULUM

Lesson 1: Fundamentals of Lesson 2: Analyzing


Vulnerability Assessment Vulnerabilities and Exploits

Introduction Uncovering Infrastructure


Scanning and Exploits Vulnerabilities
Assisted Demo Attacks Against Analyzers and
IDS
Exposing Server Vulnerabilities
Assisted Demo
Lesson 3: Configuring Scanners Revealing Desktop
and Generating Reports Vulnerabilities

Implementing Scanner Lesson 4: Assessing Risks in a


Operations and Changing Environment
Configurations
Creating and Interpreting
Reports Researching Alert Information
Assisted Demo Identifying Factors that Affect Risk

https://refontelearning.com
Lesson 5: Risk Calculation Lesson 6: Managing Vulnerabilities

The Vulnerability Management


Risk Standard Cycle
Vulnerability Controversies

Penetration Testing
Throughout this course, you'll conduct an assessment of a computer system's
security by performing an attack. You'll analyze the system's resilience against
both authenticated and unauthenticated attacks, considering various system
roles and risk management factors.

Key Learning Objectives:


 Analyze the risk exposure of the organization across local and wide area
networks.
 Perform penetration testing on web applications to enhance system
security and stability.
 Simulate diverse attacks posing potential threats to business operations.
 Generate customized packets utilizing Netcat.
COURSE CURRICULUM
Introduction to Penetration
Testing
Testing

Penetration Testing Exploit Identification


Setting up a Hacking Lab Web Application Concepts
Phases of Penetration Testing Web App Threats
Web Application PT
Assisted Demo
Reconnaissance

Scanning Networks

Introduction to
Reconnaissance Network Scanning Concepts
Passive Reconnaissance Scanning Tools
Active Reconnaissance Port Scanning Techniques

https://refontelearning.com
System Penetration Testing Web Application Penetration

Exploiting and Gaining Post Exploitation


Access_x001D_
Setting up Metasploitable
Exploitation_x001D_
Assisted Demo_x001D_ Gaining Access
Windows 10 Exploit

CONTACT US
[email protected]

Enroll Now

You might also like