Cyber security, web application pentration

Basics of cyber security, basics of ethical hacking,


Duration : 15 days
Fees : 18000 INR

  •  Basic information about ethical hacking
  • Tools of ethical hacking
  • Tools of cybersecurity 
  • Tools for web application pentration
  • Live session by certified trainer 

Introduction to Cyber Security and Cyber Attacks

Duration: 30 Hours

 

 

Module 1: Introduction to Cybersecurity 

What is cybersecurity? History and evolution of cyber threats.

Understanding the digital landscape: Networks, devices, and data.

The CIA triad: Confidentiality, Integrity, and Availability.

Cybersecurity ethics and responsible disclosure.

Module 2: Cyber Threats and Actors 

Types of cyber attackers: Hackers, crackers, cybercriminals, nation-states.

Motives behind cyberattacks: Financial gain, espionage, activism, etc.

Social engineering techniques: Phishing, pretexting, baiting, etc.

Malware: Viruses, worms, Trojans, ransomware, spyware, etc.

Module 3: Attack Vectors and Vulnerabilities 

Network security fundamentals: Firewalls, intrusion detection systems (IDS), access control lists (ACLs).

Operating system vulnerabilities: Patch management and software updates.

Web application security: Common vulnerabilities like SQL injection and XSS.

Physical security: Protecting devices and data from unauthorized access.

Module 4: Securing Your Online Presence 

Password security: Creating strong passwords and using password managers.

Multi-factor authentication (MFA) and its importance.

Securing your devices: Encryption, antivirus software, and updates.

Secure browsing practices: Avoiding suspicious links and websites.

Social media security: Managing privacy settings and being cautious about what you share.

Module 5: Introduction to Network Security 

Network topologies and security considerations.

Wireless network security: WPA2 encryption and guest networks.

Virtual Private Networks (VPNs) and their benefits.

Secure communication protocols: HTTPS vs. HTTP, SSH vs. Telnet.

Network segmentation and its role in security.

 

Module 6: Introduction to Cybercrime and Incident Response 

Common cybercrimes: Identity theft, data breaches, denial-of-service attacks.

Legal aspects of cybercrime: Laws and regulations regarding cyberattacks.

Incident response process: Detection, containment, eradication, recovery, and reporting.

Best practices for re

porting cyberattacks to authorities.