Cybersecurity Course Syllabus

Cybersecurity Course Syllabus, Software Applications & Systems, Computer Networks, Malware Analysis, Hawking Techniques, Data Security, and Network Security.

Prerequisites:

1. Knowledge of Various Operating Environments
2. Computer Networks
3. Programming Fundamentals
4. Database Fundamentals
5. Software Applications and Systems

Cybersecurity Course Syllabus

1. Cybersecurity Fundamentals

  • What is Cyberspace?
  • What is Cybersecurity?
  • Why is Cybersecurity Important?
  • What is a Hacker?
  • What is Malware?

2. Software Applications

a. Desktop Applications
b. Web Applications

3. System Hacking & Security

  • Introduction To Hacking
  • Hacking vs. Ethical hacking
  • Skill Profile of a Hacker
  • Types of Hackers
  • Some Famous Hackers and Groups
  • Introduction to Operating Systems
  • Windows & Linux Operating Systems
  • Windows Security Issues
  • Hacking Windows 10
  • System Hacking – Counter Measures, Services, Ports, Protocols
  • Firewall Configuration Monitoring System

4. Malware Analysis

  • Introduction To Malware Analysis Types Of Malware
  • Virus, Worms, Backdoors, Spyware, Adware Introduction to Trojans
  • Trojans Attack Famous Cases
  • Ways a Trojan Can Get Into A System
  • Analysis Of Trojans/Virus
  • How we remove Trojans Manually
  • Security Against Malware
  • Immediate response against malware

5. Types of Cyber Attacks and Prevention Tips

  • Password Attacks
  • Craft a Strong Password
  • Denial of Service Attacks
  • Two‐Step Verification
  • Passive Attack
  • Download Attachments with Care
  • Penetration Testing

6. Network Security & Hacking

  • Introduction To Networks ( LAN /WAN )
  • Understanding Communication Protocols
  • Sniffing Attacks
  • DOS & DDOS Attack
  • Mis-configuration
  • Man – In – Middle – Attacks
  • RIP attacks, IP spoofing, Mac Spoofing
  • Firewall Configuration & Maintenance
  • Network Monitoring & Analysis
  • ISP Attacks
  • Logs Maintenance

7. Data Security and Recovery

  • What Is Steganography
  • Alternate data stream in NTFS
  • How Attacker Hides His Data in Images and Other Formats
  • How to Find Data Which Are Hidden
  • What Is Cryptography
  • Securing Data by Using EFS and BitLocker
  • Advanced Cryptography Tools
  • Vera crypt and Trucrypt

8. Web Application Penetration Testing

  • Types of Penetration Testing
  • White Box Penetration Testing
  • Black Box Penetration Testing
  • Grey Box Penetration Testing
  • Setting up Browser Proxies
  • Introduction To Burpsuite
  • Introduction To OWASP
  • Introduction of Websites & Database
  • Authentication Process Of Web Application
  • Attack on Website & Web Application
  • Get and Post Parameters
  • SQL Injection Attacks
  • Cross-site scripting
  • Session hijacking

Cryptography & Security

  • Concept of Cryptography
  • Advantages and uses of Cryptography
  • PKI (Public Key Infrastructure)
  • DES , AES , Algamal , e.t.c.
  • Algorithm’s of encryption–RSA, MD5, SHA, SSL, PGP, SSH, GAK Concept of Digital Signature
  • Encryption Cracking Techniques
  • Disk Encryption
  • CA (Certificate Authority)
  • Cryptanalysis

Introduction to Cybersecurity Document
Introduction to Cybersecurity Video
Follow me on social media: