Basic understanding of Operating Systems, good understanding of Networking concepts
Program Outline
Session 1: Ethical Hacking Tools and Countermeasures
Introduction to Ethical Hacking
Understanding Elements of Information Security
Understanding Information Security Threats and Attack Vectors
Overview of Hacking Concepts, Types and Phases
Understanding Ethical Hacking Concepts and Scope
Overview of Information Security Management and Defense-In-Depth
Overview of Policies Procedures and Awareness
Overview of Physical Security and Controls
Understanding Incident Management Process
Overview of Vulnerability Assessment and Penetration Testing
Overview of Information Security Acts and Laws
Footprinting and Reconnaissance (Techniques and Countermeasures)
Understanding Footprinting Concepts
Footprinting through Search engines
Footprinting using advanced Google Hacking techniques
Footprinting through Social Networking Sites
Understanding Different Techniques for Email Footprinting
Understandign Different Techniques for WHOIS and DNS Footprinting
Footprinting and Reconnaissance Counter measures
Session 2: Network Scanning (Methods and Countermeasures)
Understanding different techniques to check for Live Systems
Understanding different techniques to check for Open Ports
Understanding various Scanning Techniques
Understanding various IDS Evasion Techniques
Understanding Banner Grabbing
Using Proxies and Anonymizers for Attack
Understanding IP Spoofing and various Detection Techniques
Countermeasures of Network Scanning
Enumeration (Methods and Countermeasures)
Understanding Enumeration Concepts
Understanding Different Techniques for NetBIOS Enumeration
Understanding Different Techniques for SNMP Enumeration
Understanding Different Techniques for LDAP Enumeration
Understanding Different Techniques for NTP Enumeration
Understanding Different Techniques for SMTP and DNS Enumeration
Enumeration Countermeasures
Session 3. System Hacking (Methods and Countermeasures)
Understanding Techniques to Gain Access to the System
Understanding Privilege Escalation Techniques
Understanding Techniques to Create and Maintain Remote Access to the System
Overview of Different Types of Rootkits
Overview of Steganography and Steganalysis Techniques
Understanding Techniques to Hide the Evidence of Compromise
Network Sniffing (Methods and Countermeasures)
Overview of Sniffing Concepts
Understanding Network Sniffing Attacks
Use of Different Various Sniffing Tools
Implementing Sniffing Countermeasures
Understanding various techniques to detect Sniffing
Session 4: Malware Threats
Introduction to Malware and Malware Propagation Techniques
Overview of Trojans, Their Types and How to Infect Systems
Overview of Viruses, Their Types, and How They Infect Files
Overview of Computer Warms, their Types and How to Infect Systems
Understanding the Malware Analysis Process
Understanding Different Techniques to Detect Malware
Malware Threats and and Countermeasures
Vulnerability Management Planning and Implementation
Tenable Nessus
Registration and Installation of Tenable Nessus
Host Discovery Scan through Nessus
Basic Host Scan
Advance host scan through Nessus
Fine tuning of Nessus scan engine
Exploration of all advanced options in Nessus Community Edition
Session 5: Checkpoint Security Gateway
Understanding Architecture of Checkpoint Firewall
Installation of Checkpoint Security Gateway and Management Server
Implement NAT Policy
Implement an access Policy
Implement IPS Inspection Policy
Implementation of URL Filtering Policy
Log Analysis and Troubleshooting options in Checkpoint Security Gateway
Fine Tuning Options of Checkpoint Firewall
Security Incident and Event Management (SIEM) Solution
Understanding need of SIEM Solution
Understanding Security Operation Center (SOC) Environment
Understanding Architecture and various components of McAfee SIEM
Installation of ESM, Receiver and ELM
Adding Data Sources to Receiver
Event Analysis and Filtering of Events
Create and Edit Dashboards
Create Alarm and Watchlists
Editing Policies through Policy Editor
Investigate events and Incidents
Session 6: Cloud Security (AWS)
Introduction to AWS
Understanding Compliances through Amazon Artifact
Understanding Network ACLs
Understanding and use of Security groups
Understanding the AWS Certificate Manager
Understanding the requirements of Cloud HSM
Understanding and Implementation of AWS Directory Service
Understanding AWS Guard Duty
Understanding AWS Inspector
Usage of AWS Secrets Manager
Understanding of AWS Single Sign-On
Understanding options in AWS WAF
Requirement and understanding of AWS Shield
Compliances
Complying with Laws and Regulations
Overview, Understanding and usage of ISO 27001
Overview, Understanding and usage of CIS Controls
Pre-requisites for the program:
Basic understanding of Operating systems and good understanding of Networking concepts
Sazan Consulting helps you find a career that fits your passion. Building a successful career is a process, and it does not happen overnight.
Sazan has been delivering job-oriented, comprehensive training programs to candidates for more than ten years. Sazan possesses the expertise and resources to deliver training as per the highest quality standards.
These training programs range from 6 to 8 weeks and are conducted by industry experts working for reputable North American companies. Trainers have excellent knowledge of different domain industries. That is why the classes are conducted only on weekends and are more focused on real-time projects.
The different training programs that are offered by Sazan are:
Business Analysis
Business Intelligence
Big Data/Data Science
Full Stack
AWS DevOps
Cyber Security
System Administration and AWS Infrastructure
Features
Industry Expert Trainers
Weekend Classes Only
Resume and Interview Preparation
Interactive Sessions
On-the-Job Support
Our guidance and training help job seekers nourish their skills and build great careers by choosing the right programs that suit the candidate’s interests and skill set.
Recently, Sazan Consulting was recognized by the Canadian Business Review Board (CBRB) and awarded one of Canada’s best businesses for its customer satisfaction, outstanding service, business leadership, and strong vision.
This course is designed to provide you with an overview of criminal activity perpetrated using computers, the internet, and other network-connected digital devices.
In collaboration with the employer community, we rapidly train essential skill sets required to secure high-paying entry-level information security jobs.
The CCCS Cybersecurity Awareness and Prevention Training course teaches you specific rules on how to identify phishing emails, browsing, and mobile devices. Best practices to take control over social engineering.
Built on case scenarios and real-world examples, a Certificate in Information Security Management will enable the participants to carry out the functions of Information Security Project Management within the framework of the organizational requirements.
The C|CISO certification is an industry-leading program that recognizes the real-world experience necessary to succeed at the highest executive levels of information security.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy