Introduction
The purpose of this course is to equip one with the technologies involved in Cyber Security. The knowledge of these technologies helps in building an appreciation of possible threats, taking preventive measures and taking corrective actions when need be.
Course Coverage
- Basic Concepts
- Cryptography, Cryptographic Protocols & IPSec
- OS Security - Access Control, Rootkit
- Hacking (Ethical & Malicious)
- DDOS & Ransomware
- HTTP - DNS Filtering
- Malaware & Worms
- Firewalls
- Intrusion Detection & Prevention
- OWASP10
- Vulnerability Testing
- API Security
- SQL Injection & Cross site scripting
- Incident Response Plan & Attack planning
- Tools & Methods
- a) Proxy Servers and Anonymizers.
- b) Phishing.
- c) Password Cracking.
- d) Keyloggers and Spywares.
- e) Virus and Worms
- f) DoS and DDoS Attacks.
- g) Attacks on Wireless Networks.
- h) Identity Theft (ID Theft).
- Understanding Computer Forensics
- a) Cyber forensics and Digital Evidence.
- b) Forensics Analysis of Email.
Course Design
This is an on-line instructor-lead course that'll covered over 6 sessions of two hours each.
The course is focused more on practice.