Cybersecurity Course Syllabus, Software Applications & Systems, Computer Networks, Malware Analysis, Hawking Techniques, Data Security, and Network Security.
Prerequisites:
1. Knowledge of Various Operating Environments
2. Computer Networks
3. Programming Fundamentals
4. Database Fundamentals
5. Software Applications and Systems
Cybersecurity Course Syllabus
1. Cybersecurity Fundamentals
- What is Cyberspace?
- What is Cybersecurity?
- Why is Cybersecurity Important?
- What is a Hacker?
- What is Malware?
2. Software Applications
a. Desktop Applications
b. Web Applications
3. System Hacking & Security
- Introduction To Hacking
- Hacking vs. Ethical hacking
- Skill Profile of a Hacker
- Types of Hackers
- Some Famous Hackers and Groups
- Introduction to Operating Systems
- Windows & Linux Operating Systems
- Windows Security Issues
- Hacking Windows 10
- System Hacking – Counter Measures, Services, Ports, Protocols
- Firewall Configuration Monitoring System
4. Malware Analysis
- Introduction To Malware Analysis Types Of Malware
- Virus, Worms, Backdoors, Spyware, Adware Introduction to Trojans
- Trojans Attack Famous Cases
- Ways a Trojan Can Get Into A System
- Analysis Of Trojans/Virus
- How we remove Trojans Manually
- Security Against Malware
- Immediate response against malware
5. Types of Cyber Attacks and Prevention Tips
- Password Attacks
- Craft a Strong Password
- Denial of Service Attacks
- Two‐Step Verification
- Passive Attack
- Download Attachments with Care
- Penetration Testing
6. Network Security & Hacking
- Introduction To Networks ( LAN /WAN )
- Understanding Communication Protocols
- Sniffing Attacks
- DOS & DDOS Attack
- Mis-configuration
- Man – In – Middle – Attacks
- RIP attacks, IP spoofing, Mac Spoofing
- Firewall Configuration & Maintenance
- Network Monitoring & Analysis
- ISP Attacks
- Logs Maintenance
7. Data Security and Recovery
- What Is Steganography
- Alternate data stream in NTFS
- How Attacker Hides His Data in Images and Other Formats
- How to Find Data Which Are Hidden
- What Is Cryptography
- Securing Data by Using EFS and BitLocker
- Advanced Cryptography Tools
- Vera crypt and Trucrypt
8. Web Application Penetration Testing
- Types of Penetration Testing
- White Box Penetration Testing
- Black Box Penetration Testing
- Grey Box Penetration Testing
- Setting up Browser Proxies
- Introduction To Burpsuite
- Introduction To OWASP
- Introduction of Websites & Database
- Authentication Process Of Web Application
- Attack on Website & Web Application
- Get and Post Parameters
- SQL Injection Attacks
- Cross-site scripting
- Session hijacking
Cryptography & Security
- Concept of Cryptography
- Advantages and uses of Cryptography
- PKI (Public Key Infrastructure)
- DES , AES , Algamal , e.t.c.
- Algorithm’s of encryption–RSA, MD5, SHA, SSL, PGP, SSH, GAK Concept of Digital Signature
- Encryption Cracking Techniques
- Disk Encryption
- CA (Certificate Authority)
- Cryptanalysis