Module 2: Types of Cybersecurity Attacks and Threats
3
Module 4: Types of Security
4
Module 5: Reconnaissance
5
Module 6: Defensive Security
6
Module 7: Offensive Security and Reverse Engineering
7
Module 8:Cyber Threat Intelligence
8
Module 9: Emerging Threats and Defenses
9
Module 10: Cybersecurity Tools and Software
10
Module 11: Encryption and Cryptography
11
Module 12: Identity and Access Management
12
Module 13: Network Security and System Hardening
13
Module 14: Wireless Security
14
Module 15: Ethical Hacking and Penetration Testing
15
Module 16: Accessing The Darknet using TOR
16
Module 17: Digital Forensics & Incident Management
17
Module 18: Cybersecurity Processes
18
Module 19: Advanced Concepts
19
Module 20: Ethics, Compliance, and Standards
20
Module 21: Cyber security job functions
21
Module 23: Windows Hacking
22
Module 24: Hands on
What is Cybersecurity.
Differences between Cybersecurity and Information Security.
Common Cybersecurity terms.
Physical and logical security
Malicious Actors and their goals.
Why Cybersecurity - overview of cybersecurity threats and risks.
Role of Cloud Computing in Cybersecurity.
Principles of design and implementation of security mechanisms.
Malware
Spyware and Adware
Ransomware
Social Engineering
Phishing
Brute Force Attacks
Man-in-the-middle Attacks
DoS and DDoS Attacks
Network Attacks
Security layers and vulnerabilities
Administrative security
Logical security
Data security
Security Operations (SecOps)
Network security
Database security
Web security
Attacks, exploits and preventive methods
Passive Reconnaissance
Active Reconnaissance
Identifying and mitigating risks with reconnaissance
Legal and ethical considerations of reconnaissance
Need for Defensive Cybersecurity techniques
Security controls
Data Loss prevention Systems (DLP)
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
Anti-malware and anti-virus software
Identifying attack surface
Honeypot and DMZ
Defensive security by anonymity and pseudonymity
Backup as the insurance against attacks
Overview of Offensive Cybersecurity techniques
Penetration Testing Overview
Threats and Threat Profiling
Advanced Persistent Threats
Exploitation
Reverse Engineering concepts
Red Team, Blue Team, Purple Team
Metadata Analysis
Malware Analysis
Phishing Analysis
Understanding the threat landscape
Types of Threat Intelligence
Gathering and analyzing threat intelligence data
Users of Threat Intelligence
Using threat intelligence to improve security
Malware Threats
Dealing with a Data Breach
Attacks and Defenses
Privacy Concerns
Using open-source tools
Using commercial off-the-self tools
Using virtualization for Cybersecurity work
Cybersecurity OS Distributions - Kali Linux, Parrot OS
Cybersecurity test environments
Licensing considerations
Metasploit overview
Nmap overview
Ping overview
Wireshark overview
Basic concepts of cryptography
Cryptographic ciphers (Symmetric and Asymmetric)
Encryption algorithms
Data encryption and key management
Attacks against encryption
Certificates
Public Key Infrastructure (PKI)
Certificate management
Identity and Access Management overview
Authentication and authorization
Single sign-on and federated identity
Identity Governance and Administration
Authentication protocols
Single-Factor and multi-factor authentication
Network protocols and architecture
Network security best practices
Network Defense and Countermeasures (NDC)
Firewalls, IDS, and IPS for Network Security
Reverse proxies
Virtual Private Networks (VPN) and secure remote access
DMZ and virtual hosts
Endpoint Security
Network packet analysis
System hardening
Patch management
Wireless security best practices
WAP security - Part 1
WAP security - Part 2
Wireless live packet capture
Wireless packet capture analysis
Type of attacks malicious actors do on wireless networks
Purpose of Ethical Hacking
White Hat vs Black Hat hackers
Phases in Ethical Hacking
Exploitation techniques
Ethical Hacking for application security
Ethical Hacking for hardware security
What are TOR and Hidden services? - Part 1
What are TOR and Hidden services? - Part 2
Deepweb vs Darkweb
Social Media on TOR - Part 1
Social Media on TOR - Part 2
Disk Image Forensics
Linux System Auditing
Process of Digital Forensics Investigations
Incident Management
Cybersecurity Management Processes
Secure application development and deployment
Change and release management
Automation for Cybersecurity
QA process for Cybersecurity
Multi-Layer Security
SIEM
Attack Vectors
Mobile endpoint security
Root Cause Analysis
Internet of Things (IoT) security
Edge Computing and Cybersecurity
Cyber Warfare
Blockchain Security
Incident Response and Disaster Recovery
Overview of regulatory compliance
Cyber Laws
Ethics for a Cybersecurity Professional
Commonly used security standards and frameworks
Players/Stakeholders in Cybersecurity
Cybersecurity career opportunities
Cybersecurity organization structure
Security team composition
Role of a Cybersecurity professional in general
Role of a Security Analyst
Role of a CISO (Chief Information Security Officer)
Hacking Windows - Part 1
Hacking Windows - Part 2
Cracking Windows Password