Cyber Security

by Sazan Consulting Inc. Claim Listing

Basic understanding of Operating Systems, good understanding of Networking concepts

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Sazan Consulting Inc. Logo

img Duration

6 Weeks

Course Details

Program Outline

Session 1: Ethical Hacking Tools and Countermeasures

  • Introduction to Ethical Hacking

    • Understanding Elements of Information Security

    • Understanding Information Security Threats and Attack Vectors

    • Overview of Hacking Concepts, Types and Phases

    • Understanding Ethical Hacking Concepts and Scope

    • Overview of Information Security Management and Defense-In-Depth

    • Overview of Policies Procedures and Awareness

    • Overview of Physical Security and Controls

    • Understanding Incident Management Process

    • Overview of Vulnerability Assessment and Penetration Testing

    • Overview of Information Security Acts and Laws

  • Footprinting and Reconnaissance (Techniques and Countermeasures)

    • Understanding Footprinting Concepts

    • Footprinting through Search engines

    • Footprinting using advanced Google Hacking techniques

    • Footprinting through Social Networking Sites

    • Understanding Different Techniques for Email Footprinting

    • Understandign Different Techniques for WHOIS and DNS Footprinting

    • Footprinting and Reconnaissance Counter measures

 

Session 2: Network Scanning (Methods and Countermeasures)

    • Understanding different techniques to check for Live Systems

    • Understanding different techniques to check for Open Ports

    • Understanding various Scanning Techniques

    • Understanding various IDS Evasion Techniques

    • Understanding Banner Grabbing

    • Using Proxies and Anonymizers for Attack

    • Understanding IP Spoofing and various Detection Techniques

    • Countermeasures of Network Scanning

  • Enumeration (Methods and Countermeasures)

    • Understanding Enumeration Concepts

    • Understanding Different Techniques for NetBIOS Enumeration

    • Understanding Different Techniques for SNMP Enumeration

    • Understanding Different Techniques for LDAP Enumeration

    • Understanding Different Techniques for NTP Enumeration

    • Understanding Different Techniques for SMTP and DNS Enumeration

    • Enumeration Countermeasures

 

Session 3.   System Hacking (Methods and Countermeasures)

  • Understanding Techniques to Gain Access to the System

  • Understanding Privilege Escalation Techniques

  • Understanding Techniques to Create and Maintain Remote Access to the System

  • Overview of Different Types of Rootkits

  • Overview of Steganography and Steganalysis Techniques

  • Understanding Techniques to Hide the Evidence of Compromise

  • Network Sniffing (Methods and Countermeasures)

    • Overview of Sniffing Concepts

    • Understanding Network Sniffing Attacks

    • Use of Different Various Sniffing Tools

    • Implementing Sniffing Countermeasures

    • Understanding various techniques to detect Sniffing

 

Session 4: Malware Threats

  • Introduction to Malware and Malware Propagation Techniques

  • Overview of Trojans, Their Types and How to Infect Systems

  • Overview of Viruses, Their Types, and How They Infect Files

  • Overview of Computer Warms, their Types and How to Infect Systems

  • Understanding the Malware Analysis Process

  • Understanding Different Techniques to Detect Malware

  • Malware Threats and and Countermeasures

  • Vulnerability Management Planning and Implementation

  • Tenable Nessus

    • Registration and Installation of Tenable Nessus

    • Host Discovery Scan through Nessus

    • Basic Host Scan

    • Advance host scan through Nessus

    • Fine tuning of Nessus scan engine

    • Exploration of all advanced options in Nessus Community Edition

 

Session 5: Checkpoint Security Gateway

    • Understanding Architecture of Checkpoint Firewall

    • Installation of Checkpoint Security Gateway and Management Server

    • Implement NAT Policy

    • Implement an access Policy

    • Implement IPS Inspection Policy

    • Implementation of URL Filtering Policy

    • Log Analysis and Troubleshooting options in Checkpoint Security Gateway

    • Fine Tuning Options of Checkpoint Firewall

  • Security Incident and Event Management (SIEM) Solution

    • Understanding need of SIEM Solution

    • Understanding Security Operation Center (SOC) Environment

    • Understanding Architecture and various components of McAfee SIEM

    • Installation of ESM, Receiver and ELM

    • Adding Data Sources to Receiver

    • Event Analysis and Filtering of Events

    • Create and Edit Dashboards

    • Create Alarm and Watchlists

    • Editing Policies through Policy Editor

    • Investigate events and Incidents

 

Session 6: Cloud Security (AWS)

  • Introduction to AWS

  • Understanding Compliances through Amazon Artifact

  • Understanding Network ACLs

  • Understanding and use of Security groups

  • Understanding the AWS Certificate Manager

  • Understanding the requirements of Cloud HSM

  • Understanding and Implementation of AWS Directory Service

  • Understanding AWS Guard Duty

  • Understanding AWS Inspector

  • Usage of AWS Secrets Manager

  • Understanding of AWS Single Sign-On

  • Understanding options in AWS WAF

  • Requirement and understanding of AWS Shield

  • Compliances

    • Complying with Laws and Regulations

    • Overview, Understanding and usage of ISO 27001

    • Overview, Understanding and usage of CIS Controls

 

Pre-requisites for the program:

Basic understanding of Operating systems and good understanding of Networking concepts

  • Toronto Branch

    421 Nugget Av. Unit 4 Toronto ON M1S 4L8, Toronto

Check out more Cybersecurity courses in Canada

Infoventure Technologies Inc. Logo

NetScaler Application Firewall

Infoventure Technologies offers job-oriented IT courses. Having successfully completed an IT course and a certificate will be advantageous to you when you apply for a job. If you are new to IT, you can join one of the general IT courses.

by Infoventure Technologies Inc. [Claim Listing ]
Ultimate IT Courses Logo

Cybersecurity Training and Certification

Starting with cyber security foundational courses, it goes on to cover advanced topics such as cloud and web application security, penetration testing, infosec forensics, and many more.

by Ultimate IT Courses [Claim Listing ]
ORION Logo

Certified Network Defender (CND)

Learn how to protect, detect, and respond to network attacks and attain defence-in-depth security. Certified Network Defender (CND) is designed to help organizations create and deploy the most comprehensive network defence system.

by ORION [Claim Listing ]
  • Price
  • Start Date
  • Duration
Liberty College Of Management Logo

Cyber Security

Cyber Security course is offered by Liberty College Of Management. This course is designed to provide students an introduction to cybersecurity and understanding its basic concepts.

by Liberty College Of Management [Claim Listing ]
QCT College Logo

Cyber Security Program

Will help you gain advanced technology-based knowledge regarding cyber security and its aspects like Information Systems, Cloud Computing, Cyber Forensics, and other related topics.

by QCT College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy