Cyber Security

by Sazan Consulting Inc. Claim Listing

Basic understanding of Operating Systems, good understanding of Networking concepts

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Sazan Consulting Inc. Logo

img Duration

6 Weeks

Course Details

Program Outline

Session 1: Ethical Hacking Tools and Countermeasures

  • Introduction to Ethical Hacking

    • Understanding Elements of Information Security

    • Understanding Information Security Threats and Attack Vectors

    • Overview of Hacking Concepts, Types and Phases

    • Understanding Ethical Hacking Concepts and Scope

    • Overview of Information Security Management and Defense-In-Depth

    • Overview of Policies Procedures and Awareness

    • Overview of Physical Security and Controls

    • Understanding Incident Management Process

    • Overview of Vulnerability Assessment and Penetration Testing

    • Overview of Information Security Acts and Laws

  • Footprinting and Reconnaissance (Techniques and Countermeasures)

    • Understanding Footprinting Concepts

    • Footprinting through Search engines

    • Footprinting using advanced Google Hacking techniques

    • Footprinting through Social Networking Sites

    • Understanding Different Techniques for Email Footprinting

    • Understandign Different Techniques for WHOIS and DNS Footprinting

    • Footprinting and Reconnaissance Counter measures

 

Session 2: Network Scanning (Methods and Countermeasures)

    • Understanding different techniques to check for Live Systems

    • Understanding different techniques to check for Open Ports

    • Understanding various Scanning Techniques

    • Understanding various IDS Evasion Techniques

    • Understanding Banner Grabbing

    • Using Proxies and Anonymizers for Attack

    • Understanding IP Spoofing and various Detection Techniques

    • Countermeasures of Network Scanning

  • Enumeration (Methods and Countermeasures)

    • Understanding Enumeration Concepts

    • Understanding Different Techniques for NetBIOS Enumeration

    • Understanding Different Techniques for SNMP Enumeration

    • Understanding Different Techniques for LDAP Enumeration

    • Understanding Different Techniques for NTP Enumeration

    • Understanding Different Techniques for SMTP and DNS Enumeration

    • Enumeration Countermeasures

 

Session 3.   System Hacking (Methods and Countermeasures)

  • Understanding Techniques to Gain Access to the System

  • Understanding Privilege Escalation Techniques

  • Understanding Techniques to Create and Maintain Remote Access to the System

  • Overview of Different Types of Rootkits

  • Overview of Steganography and Steganalysis Techniques

  • Understanding Techniques to Hide the Evidence of Compromise

  • Network Sniffing (Methods and Countermeasures)

    • Overview of Sniffing Concepts

    • Understanding Network Sniffing Attacks

    • Use of Different Various Sniffing Tools

    • Implementing Sniffing Countermeasures

    • Understanding various techniques to detect Sniffing

 

Session 4: Malware Threats

  • Introduction to Malware and Malware Propagation Techniques

  • Overview of Trojans, Their Types and How to Infect Systems

  • Overview of Viruses, Their Types, and How They Infect Files

  • Overview of Computer Warms, their Types and How to Infect Systems

  • Understanding the Malware Analysis Process

  • Understanding Different Techniques to Detect Malware

  • Malware Threats and and Countermeasures

  • Vulnerability Management Planning and Implementation

  • Tenable Nessus

    • Registration and Installation of Tenable Nessus

    • Host Discovery Scan through Nessus

    • Basic Host Scan

    • Advance host scan through Nessus

    • Fine tuning of Nessus scan engine

    • Exploration of all advanced options in Nessus Community Edition

 

Session 5: Checkpoint Security Gateway

    • Understanding Architecture of Checkpoint Firewall

    • Installation of Checkpoint Security Gateway and Management Server

    • Implement NAT Policy

    • Implement an access Policy

    • Implement IPS Inspection Policy

    • Implementation of URL Filtering Policy

    • Log Analysis and Troubleshooting options in Checkpoint Security Gateway

    • Fine Tuning Options of Checkpoint Firewall

  • Security Incident and Event Management (SIEM) Solution

    • Understanding need of SIEM Solution

    • Understanding Security Operation Center (SOC) Environment

    • Understanding Architecture and various components of McAfee SIEM

    • Installation of ESM, Receiver and ELM

    • Adding Data Sources to Receiver

    • Event Analysis and Filtering of Events

    • Create and Edit Dashboards

    • Create Alarm and Watchlists

    • Editing Policies through Policy Editor

    • Investigate events and Incidents

 

Session 6: Cloud Security (AWS)

  • Introduction to AWS

  • Understanding Compliances through Amazon Artifact

  • Understanding Network ACLs

  • Understanding and use of Security groups

  • Understanding the AWS Certificate Manager

  • Understanding the requirements of Cloud HSM

  • Understanding and Implementation of AWS Directory Service

  • Understanding AWS Guard Duty

  • Understanding AWS Inspector

  • Usage of AWS Secrets Manager

  • Understanding of AWS Single Sign-On

  • Understanding options in AWS WAF

  • Requirement and understanding of AWS Shield

  • Compliances

    • Complying with Laws and Regulations

    • Overview, Understanding and usage of ISO 27001

    • Overview, Understanding and usage of CIS Controls

 

Pre-requisites for the program:

Basic understanding of Operating systems and good understanding of Networking concepts

  • Toronto Branch

    421 Nugget Av. Unit 4 Toronto ON M1S 4L8, Toronto

Check out more Cybersecurity courses in Canada

Brain Station Logo

Cybersecurity Courses

With BrainStation's cybersecurity courses, you will learn foundational skills and security concepts to increase your awareness of information security, data security, and network security.

by Brain Station [Claim Listing ]
Q Academy Logo

Cyber Security CompTIA S+ and CEH (Intro)

The NASSCOM aligned Cyber Security Training program will equip you with the full range of skills needed to become an expert in this rapidly growing domain.

by Q Academy [Claim Listing ]
New Horizons London Logo

Certified Information Security Manager® (CISM)

This course is designed to help candidates prepare for sitting the ISACA CISM certification examination. By taking this course and obtaining CISM certification, your experience and skills in supporting the information security needs of your organization will be validated.

by New Horizons London [Claim Listing ]
ThreeO Project Solutions Inc. Logo

Cyber Security Risk Protection

Our Cyber Security Risk Protection course focuses on what cyber security threats and risks are and how you can protect your organization’s information assets (confidential business and customer data) from being compromised or attacked.

by ThreeO Project Solutions Inc. [Claim Listing ]
Eccentrix Logo

Cybersecurity and Cyberdefense

Our comprehensive training programs cover a wide range of EC-Council courses, ensuring that you gain industry-recognized certifications and practical expertise in ethical hacking, network defense, secure coding, and much more.

by Eccentrix [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy