Cyber Security Online Training

Cyber Security Online Training

0 STUDENTS ENROLLED

    Data today plays a major role in the IT industry. And the people don’t have a look at the amount of money need to be spent for storing and securing the data. So there is a need for security to protect the systems from the attacks. So ita good option to learn Cyber Security to protect our system from the attacks

    • Internet
    • Networking
    • System Basics
    • Introduction to Ethical Hacking
    • Foot printing and Reconnaissance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Malware Threats
    • Sniffing
    • Social Engineering
    • Denial of Services
    • Session Hijacking
    • Hacking Web servers
    • Vulnerability Analysis
    • Hacking Web Applications
    • SQL Injection
    • Hacking Wireless Networks
    • Evading IDS, Firewalls and Honey pots
    • Hacking Mobile Application Platforms
    • Cloud Computing
    • IoT Hacking
    • Cryptography

    OWASP TOP 10 :-

    1. Injection
    2. Broken Authentication
    3. Sensitive data exposure
    4. XML External Entities (XXE)
    5. Broken Access control
    6. Security misconfigurations
    7. Cross Site Scripting (XSS)
    8. Insecure Deserialization
    9. Using Components with known vulnerabilities
    10. Insufficient logging and monitoring

     

    Table Of Content

    1.Internet

    • History of internet
    • Internet life cycle
    • Submarine cable map

    2.Network

    • Types of networks
    • Topologies
    • OSI model
    • TCP/IP model
    • IP address
    • Subnet masking

    3.Operating system

    • Kernel’s
    • BIOS
    • Functions of BIOS
    • Architectures of OS

    4.Introduction to Ethical Hacking

    • What is Hacking
    • Who is a Hacker
    • Skills of a Hacker
    • Types of Hackers
    • Reasons for Hacking
    • Who are at the risk of Hacking attacks
    • Effects of Computer Hacking on an organization
    • The Security, Functionality & Usability Triangle
    • What is Ethical Hacking
    • Why Ethical Hacking is Necessary
    • Scope & Limitations of Ethical Hacking

    5.Foot printing and Reconnaissance

    • What is Foot Printing
    • Objectives of Foot Printing
    • Finding a company’s details
    • Finding a company’s domain name
    • Finding a company’s Internal URLs
    • Finding a company’s Server details
    • Finding the details of domain registration
    • Finding the range of IP Address
    • Finding the DNS information
    • Finding the location of servers
    • Traceroute analysis
    • Tracking e-mail communications

    6.Scanning

    • What is network scanning
    • Objectives of network scanning
    • Finding the live hosts in a network
    • SNMP Enumeration
    • SMTP Enumeration
    • DNS Enumeration
    • Finding open ports on a server
    • Finding the services on a server
    • OS fingerprinting
    • Server Banner grabbing tools
    • What is a Vulnerability Scanning
    • What is a proxy server
    • How does proxy server work
    • Why do hackers use proxy servers
    • What is a TOR network
    • Why hackers prefer to use TOR networks

    7.Hacking Web Servers & Web Applications

    • What is a web server
    • Different webserver applications in use
    • Why are webservers hacked & its consequences
    • Directory traversal attacks
    • Website defacement
    • Website password brute forcing

    8.Cross site scripting

    • Persistent XSS, where the malicious input originates from the website’s database.
    • Reflected XSS, where the malicious input originates from the victim’s request.
    • DOM-based XSS, where the vulnerability is in the client-side code rather than the server-side code.

    9.SQL Injection

    • What is SQL Injection
    • Effects of SQL Injection attacks
    • Types of SQL Injection attacks
    • SQL Injection detection tools

    10.Session Hijacking

    • What is session hijacking
    • Dangers of session hijacking attacks
    • Session hijacking techniques
    • How to defend against session hijacking

    11.Denial of Service

    • What is a DoS attack
    • What is a DDoS attack
    • Symptoms of a Dos attack
    • DoS attack techniques
    • What is a Botnet

    12.Social Engineering

    • Phishing
    • What is Phishing
    • How Phishing website is hosted
    • How victims are tricked to access Phishing websites
    • How to differentiate a Phishing webpage from the original webpage
    • How to defend against Phishing attacks
    • Homograph attack.

    13.Evading Firewalls, IDS & Honeypots

    • What is a Firewall
    • What are the functions of a Firewall
    • Types of firewalls
    • What is an IDS
    • How does an IDS work
    • What is a honeypot

    14.Kali Linux

    • What is Kali Linux
    • How Kali Linux is different from other Linux distributions
    • What are the uses of Kali Linux
    • Tools for Footprinting, Scanning & Sniffing
    • What is Metasploit framework
    • Using Metasploit framework to attack Wiindows machines
    • Using Metasploit framework to attack Android devices

    15.System Hacking

    • What is system Hacking ·
    • Goals of System Hacking
    • Password Cracking
    • Password complexity
    • Finding the default passwords of network devices and softwares
    • Password cracking methods o Online password cracking
    • Man-in-the-middle attack
    • Password guessing o Offline password cracking
    • Brute force cracking
    • Dictionary based cracking
    • USB password stealers
    • Elcomsoft Distributed password recovery tools
    • Active password changer
    • What is a keylogger
    • How to deploy a keylogger to a remote pc
    • How to defend against a keylogger

    16.Mobile Hacking

    • What is mobile Hacking
    • Goals of mobile Hacking
    • Countermeasures

    17.Sniffers 

    • What is a sniffer
    • How sniffer works
    • Types of sniffing
    • Active sniffing
    • Passive Sniffing
    • What is ARP
    • ARP poison attack
    • Threats of ARP poison attack
    • How MAC spoofing works
    • MAC Flooding
    • How to defend against MAC Spoofing attacks
    • How to defend against Sniffers in network

    18.Wireless Hacking

    • Types of wireless networks
    • Finding a Wi-Fi network
    • Types of Wi-Fi authentications
    • Using a centralized authentication server
    • Using local authentication
    • Types of Wi-Fi encryption methods

    1.WEP
    2.WPA
    3.WPA2

    • How does WEP work
    • Weakness of WEP encryption
    • How does WPA work
    • How does WPA2 work
    • Hardware and software required to crack Wi-Fi networks
    • How to crack WEP encryption
    • How to crack WPA encryption
    • How to crack WPA2 encryption
    • How to defend against Wi-Fi cracking attack

    19.Malware Threats

    • What is malware
    • Types of malware
    • Virus
      • What is a virus program
      • What are the properties of a virus program
      • How does a computer get infected by virus
      • Types of virus
      • Virus making tools
      • How to defend against virus attacks
    • Worm
      • What is a worm program
      • How worms are different from virus
    • Trojan
      • What is a Trojan horse
      • How does a Trojan operate
      • How to defend against Trojans
    • Spyware
      • What is a spyware
      • Types of spywares
      • How to defend against spyware
    • Rootkits
      • What is a Rootkit
      • Types of Rootkits
      • How does Rootkit operate
      • How to defend against Rootkits

    20.OWASP TOP 10

    1. Injection
    2. Broken Authentication
    3. Sensitive data exposure
    4. XML External Entities (XXE)
    5. Broken Access control
    6. Security misconfigurations
    7. Cross Site Scripting (XSS)
    8. Insecure Deserialization
    9. Using Components with known vulnerabilities

    Write a Review

    Your email address will not be published. Required fields are marked *

    Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. keen Technologies also verifies their technical background and expertise.

    We record each LIVE class session you undergo through and we will share the recordings of each session/class.

    If you have any queries you can contact our 24/7 dedicated support to raise a ticket. We provide you email support and solution to your queries. If the query is not resolved by email we can arrange for a one-on-one session with our trainers.

    You will work on real world projects wherein you can apply your knowledge and skills that you acquired through our training. We have multiple projects that thoroughly test your skills and knowledge of various aspect and components making you perfectly industry-ready.

    Our Trainers will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.

    If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.

    The Training itself is Real-time Project Oriented.

    Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.

    There are some Group discounts available if the participants are more than 2.

    As we are one of the leading providers of Online training, We have customers from USA, UK, Canada, Australia, India and other parts of the world.

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    PRIVATE COURSE
    • PRIVATE
    • 4 weeks, 2 days
    Contact Us

    +1 475-212-0075

    Drop us a query

    Job Support

    Course Features

    Live Instructor-led Classes

    This isn't canned learning. Its dynamic, its interactive, its effective

    Expert Educators

    Only the best or they're out. We are constantly evaluating our trainers

    24&7 Support

    We never sleep. Need something answered at 3 am? No Problem

    Flexible Schedule

    You don't learn as per our calendar. We work according to yours.

    Customized Training's

    The most part self-managed and adaptable to suit a person's particular adapting technology needs

    Priority Based Training's

    Real-time Scenario based Assignments and Case Studies

    Disclaimer

    This web site or keentechnologies.com team is not associated with SAP AG or any other product. We are providing this service absolutely for Education and Training purpose only. We charge for the support services only, not for the actual SAP System access. Keen Technologies does not provide official SAP training courses or certifications and does not provide any access to SAP software. SAP and its product names, including HANA, S/4HANA, HYBRIS, and LEONARDO are trademarks or registered trademarks of SAP in Germany and other countries.

    Keen Technologies does not provide official SAP training courses or certifications and does not provide any access to SAP software. SAP and its product names, including HANA, S/4HANA, HYBRIS, and LEONARDO are trademarks or registered trademarks of SAP in Germany and other countries.

    IBM® is a registered trademark of IBM in the United States.

    Popular Courses

    Countries

    Keen Technologies offering training in cities: Bangalore, Hyderabad, Chennai, Delhi, Kolkata, UK, London, Texas, Chicago, San Francisco, Dallas, Washington, New York, Houstan, Atlanta, Orlando, Boston, Toronto, Ottawa, Windsor, Australia, Dubai, Leeds.


    ONLINE MEETING PARTNERS

    top
    COPYRIGHT © 2020 KEEN IT TECHNOLOGIES PVT.LTD, ALL RIGHTS RESERVED