Cyber Security

by Sazan Consulting Inc. Claim Listing

Basic understanding of Operating Systems, good understanding of Networking concepts

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Sazan Consulting Inc. Logo

img Duration

6 Weeks

Course Details

Program Outline

Session 1: Ethical Hacking Tools and Countermeasures

  • Introduction to Ethical Hacking

    • Understanding Elements of Information Security

    • Understanding Information Security Threats and Attack Vectors

    • Overview of Hacking Concepts, Types and Phases

    • Understanding Ethical Hacking Concepts and Scope

    • Overview of Information Security Management and Defense-In-Depth

    • Overview of Policies Procedures and Awareness

    • Overview of Physical Security and Controls

    • Understanding Incident Management Process

    • Overview of Vulnerability Assessment and Penetration Testing

    • Overview of Information Security Acts and Laws

  • Footprinting and Reconnaissance (Techniques and Countermeasures)

    • Understanding Footprinting Concepts

    • Footprinting through Search engines

    • Footprinting using advanced Google Hacking techniques

    • Footprinting through Social Networking Sites

    • Understanding Different Techniques for Email Footprinting

    • Understandign Different Techniques for WHOIS and DNS Footprinting

    • Footprinting and Reconnaissance Counter measures

 

Session 2: Network Scanning (Methods and Countermeasures)

    • Understanding different techniques to check for Live Systems

    • Understanding different techniques to check for Open Ports

    • Understanding various Scanning Techniques

    • Understanding various IDS Evasion Techniques

    • Understanding Banner Grabbing

    • Using Proxies and Anonymizers for Attack

    • Understanding IP Spoofing and various Detection Techniques

    • Countermeasures of Network Scanning

  • Enumeration (Methods and Countermeasures)

    • Understanding Enumeration Concepts

    • Understanding Different Techniques for NetBIOS Enumeration

    • Understanding Different Techniques for SNMP Enumeration

    • Understanding Different Techniques for LDAP Enumeration

    • Understanding Different Techniques for NTP Enumeration

    • Understanding Different Techniques for SMTP and DNS Enumeration

    • Enumeration Countermeasures

 

Session 3.   System Hacking (Methods and Countermeasures)

  • Understanding Techniques to Gain Access to the System

  • Understanding Privilege Escalation Techniques

  • Understanding Techniques to Create and Maintain Remote Access to the System

  • Overview of Different Types of Rootkits

  • Overview of Steganography and Steganalysis Techniques

  • Understanding Techniques to Hide the Evidence of Compromise

  • Network Sniffing (Methods and Countermeasures)

    • Overview of Sniffing Concepts

    • Understanding Network Sniffing Attacks

    • Use of Different Various Sniffing Tools

    • Implementing Sniffing Countermeasures

    • Understanding various techniques to detect Sniffing

 

Session 4: Malware Threats

  • Introduction to Malware and Malware Propagation Techniques

  • Overview of Trojans, Their Types and How to Infect Systems

  • Overview of Viruses, Their Types, and How They Infect Files

  • Overview of Computer Warms, their Types and How to Infect Systems

  • Understanding the Malware Analysis Process

  • Understanding Different Techniques to Detect Malware

  • Malware Threats and and Countermeasures

  • Vulnerability Management Planning and Implementation

  • Tenable Nessus

    • Registration and Installation of Tenable Nessus

    • Host Discovery Scan through Nessus

    • Basic Host Scan

    • Advance host scan through Nessus

    • Fine tuning of Nessus scan engine

    • Exploration of all advanced options in Nessus Community Edition

 

Session 5: Checkpoint Security Gateway

    • Understanding Architecture of Checkpoint Firewall

    • Installation of Checkpoint Security Gateway and Management Server

    • Implement NAT Policy

    • Implement an access Policy

    • Implement IPS Inspection Policy

    • Implementation of URL Filtering Policy

    • Log Analysis and Troubleshooting options in Checkpoint Security Gateway

    • Fine Tuning Options of Checkpoint Firewall

  • Security Incident and Event Management (SIEM) Solution

    • Understanding need of SIEM Solution

    • Understanding Security Operation Center (SOC) Environment

    • Understanding Architecture and various components of McAfee SIEM

    • Installation of ESM, Receiver and ELM

    • Adding Data Sources to Receiver

    • Event Analysis and Filtering of Events

    • Create and Edit Dashboards

    • Create Alarm and Watchlists

    • Editing Policies through Policy Editor

    • Investigate events and Incidents

 

Session 6: Cloud Security (AWS)

  • Introduction to AWS

  • Understanding Compliances through Amazon Artifact

  • Understanding Network ACLs

  • Understanding and use of Security groups

  • Understanding the AWS Certificate Manager

  • Understanding the requirements of Cloud HSM

  • Understanding and Implementation of AWS Directory Service

  • Understanding AWS Guard Duty

  • Understanding AWS Inspector

  • Usage of AWS Secrets Manager

  • Understanding of AWS Single Sign-On

  • Understanding options in AWS WAF

  • Requirement and understanding of AWS Shield

  • Compliances

    • Complying with Laws and Regulations

    • Overview, Understanding and usage of ISO 27001

    • Overview, Understanding and usage of CIS Controls

 

Pre-requisites for the program:

Basic understanding of Operating systems and good understanding of Networking concepts

  • Toronto Branch

    421 Nugget Av. Unit 4 Toronto ON M1S 4L8, Toronto

Check out more Cybersecurity courses in Canada

University of Toronto School of Continuing Studies Logo

Enterprise IT Risk Management & Cyber Security

If your job requires you to manage IT and cyber security risks in the high-stakes world of enterprise IT, this course is for you. You'll examine IT-related risks, threats, opportunities and vulnerabilities at the strategic and operational levels.

by University of Toronto School of Continuing Studies [Claim Listing ]
Cisnet Logo

Network+

The Network+ course serves as a general introduction to computer networking, including local and wide-area network technology. This course prepares you for the CompTIA Network+ Certification Examination

by Cisnet [Claim Listing ]
ORION Logo

Certified Network Defender (CND)

Learn how to protect, detect, and respond to network attacks and attain defence-in-depth security. Certified Network Defender (CND) is designed to help organizations create and deploy the most comprehensive network defence system.

by ORION [Claim Listing ]
  • Price
  • Start Date
  • Duration
SETC Training Logo

IT Security Training

The IT Security courses at SETC Training Ottawa teach you to design and build a complete security solution while you contemplate potential vulnerabilities and threats.

by SETC Training [Claim Listing ]
SBC (Saskatoon Business College) Logo

Cyber Security

This course is designed for you as a non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

by SBC (Saskatoon Business College) [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy