eLearningCurve

Empowering Minds, Anywhere, Anytime

WhatsApp

+91 77750 32347

Call Us

+91 90750 24452

Cyber Security

About This Course

The Cyber Security Program is designed to equip students with the knowledge and skills required to protect digital systems, networks, and data from cyber threats. The program covers essential topics such as ethical hacking, network security, cryptography, risk management, and digital forensics.

Students will gain hands-on experience with industry-standard tools and techniques, preparing them for real-world cybersecurity challenges. 

Why Choose This Program?

Who Should Enrol

Curriculum

10 Modules

  • Introduction to Cybersecurity
  • What is Cybersecurity?
  • The significance of Cybersecurity in the modern world
  • The evolving cyber threat landscape
  • The role of cybersecurity professionals
  • Networking Fundamentals
  • Understanding the fundamentals of computer networks
  • Different types of networks (LAN, WAN, MAN)
  • Exploring network topologies (Star, Bus, Ring)
  • OSI and TCP/IP Models
  • Detailed exploration of IPv4 addressing and subnetting
  • Introduction to IPv6 and its advantages
  • IP Addressing and Subnetting
  • Practical subnetting exercises and examples
  • The importance of IPv6 and its adoption challenges
  • Hands-on IPv6 configuration and addressing
  • Getting Started with Linux
  • The origins and philosophy of Linux
  • What is Open-Source Software, and why is it important?
  • Overview of popular Linux distributions
  • Introduction to Linux Kernel and its role
  • Linux Kernel and Shell
  • Understanding the Linux Kernel architecture
  • Exploring different Linux Shells (e.g., Bash, Zsh)
  • Navigating the Linux file system using the command line
  • Practical exercises in accessing the command line
  • Managing Files and Directories
  • Navigating the Linux file system hierarchy
  • Detailed file and directory management commands
  • Creating, moving, copying, and deleting files and directories
  • Practical exercises in file management
  • Text File Handling
  • Creating, viewing, and editing text files with Linux commands
  • Redirecting input and output streams
  • Working with text editors (e.g., Vi, Nano)
  • Hands-on text file editing and manipulation
  • User and Group Management
  • Understanding user and group concepts in Linux
  • Gaining superuser privileges with sudo
  • Managing local user accounts: creation, modification, and deletion
  • Hands-on user and group management tasks
  • File Permissions
  • In-depth exploration of Linux file permissions
  • Interpreting permission settings (read, write, execute)
  • Managing file permissions from the command line
  • Practical exercises in permission management
  • More on File Permissions
  • - Advanced file permission concepts (e.g., chmod, chown)
  • - Default permissions and access control
  • - Configuring secure file access
  • - Real-world scenarios and troubleshooting
  • Review and Practical
  • Comprehensive review of Linux fundamentals
  • Practical exercises and challenges
  • Troubleshooting common Linux issues
  • Preparing for further Linux exploration
  • Understanding Ethical Hacking
  • Defining Ethical Hacking and its objectives
  • Elements of Security: Confidentiality, Integrity, Availability
  • The ethical hacker's code of conduct
  • Phases of Hacking 1: Reconnaissance, Scanning, Gaining Access
  • Phases of Hacking 2: Maintaining Access, Covering Tracks
  • Types of Hackers and Attacks
  • Categorizing hackers: White Hat, Black Hat, Gray Hat
  • Common types of cyberattacks: Malware, Phishing, DDoS, etc.
  • Scope and career opportunities in Ethical Hacking
  • Building ethical hacking skills and certifications
  • Introduction to Footprinting
  • Understanding Footprinting in Ethical Hacking
  • The significance of Footprinting in the reconnaissance phase
  • Legal and ethical considerations in Footprinting
  • Footprinting techniques and tools
  • Advanced Footprinting
  • Leveraging search engines for Footprinting
  • Advanced Google Hacking techniques
  • Footprinting domains and subdomains
  • Practical exercises in Footprinting
  • Passive Footprinting
  • DNS information gathering and Footprinting
  • Real-world passive Footprinting scenarios
  • DNS and Email Footprinting
  • Understanding Domain Name System (DNS)
  • Types of DNS records (A, MX, CNAME, etc.)
  • Leveraging DNS for Footprinting
  • Email Footprinting techniques and tools
  • Scanning Networks
  • Introduction to Network Scanning
  • Passive Footprinting methods and tools
  • Email Footprinting and its importance
  • Banner grabbing: Extracting information from network services
  • In-depth exploration of Nmap scanning tool
  • Practical Nmap scanning exercises
  • Nmap and Scanning Techniques
  • Advanced Nmap scanning options and strategies
  • Detecting and evading firewalls during scanning
  • Hands-on Nmap scanning scenarios
  • Best practices in network scanning
  • Enumeration and Ports
  • The significance of Enumeration in Ethical Hacking
  • Understanding ports and services enumeration
  • Enumerating common ports and services
  • Practical enumeration exercises
  • Enumerating Services
  • Techniques for service enumeration
  • Gathering information about running services
  • Hands-on service enumeration in real-world scenarios
  • Documenting findings for further analysis
  • Password Attacks
  • Exploring online and offline password attacks
  • Understanding LM and NTLM hashes
  • Cracking password hashes with tools like John the Ripper
  • Practical password cracking exercises
  • Password Recovery and Keyloggers
  • Password recovery tools and techniques
  • The role of keyloggers in system hacking
  • Detecting and countering keyloggers
  • Practical keylogger detection methods
  • Malware Threats
  • Introduction to malware and its forms
  • Understanding viruses and worms
  • Creating and analyzing malware payloads
  • Anti-malware tools and strategies
  • Malware Creation and Prevention
  • Creating malicious payloads for ethical hacking
  • Preventing malware infections and propagation
  • Practical exercises in malware analysis
  • Developing effective malware prevention strategies
  • Network Sniffing
  • The art of network packet sniffing
  • Network sniffing tools and their capabilities
  • MITM (Man-in-the-Middle) attacks
  • Practical network sniffing scenarios
  • Man-in-the-Middle Attacks
  • Techniques for conducting MITM attacks
  • Intercepting and modifying network traffic
  • Defense mechanisms against MITM attacks
  • Real-world MITM attack demonstrations
  • Wireshark and Packet Analysis
  • In-depth exploration of Wireshark
  • Filtering and analyzing network packets
  • Detecting suspicious network activities
  • Practical Wireshark packet analysis exercises
  • Social Engineering Concepts
  • Understanding the psychology of social engineering
  • Phases of a social engineering attack
  • Recognizing the signs of a social engineering attempt
  • Ethical considerations in social engineering
  • Social Engineering Techniques
  • Common social engineering techniques
  • Impersonation on social networking sites
  • Social networking threats to corporate networks
  • Identity theft and its impact
  • Social Engineering Countermeasures
  • Countermeasures against social engineering attacks
  • Raising awareness and training employees
  • Implementing security policies and procedures
  • Ethical and responsible use of social engineering in testing
  • Denial-of-Service (DoS) Attacks
  • Understanding Denial-of-Service and Distributed Denial-of-Service (DDoS) attacks
  • Attack motivations and objectives
  • DoS/DDoS attack techniques and vectors
  • Analyzing real-world DoS/DDoS scenarios
  • Distributed Denial-of-Service (DDoS)
  • Differentiating between DoS and DDoS
  • Botnets and their role in DDoS attacks
  • Mitigation strategies for DDoS attacks
  • Practical DDoS detection and prevention exercises
  • Introduction to Honeypots
  • Exploring the concept of honeypots
  • Installing and configuring a honeypot
  • Types of honeypots and their applications
  • Honeypot deployment best practices
  • Honeypot Implementation
  • - Configuring a honeypot system for data collection
  • - Analyzing honeypot data and identifying threats
  • - Responding to incidents detected by honeypots
  • - Honeypot security and maintenance considerations
  • Web Server Security
  • Understanding web server concepts and applications
  • Web application threats and vulnerabilities
  • HTTP headers and their significance
  • Introduction to the OWASP Top 10
  • Web Application Hacking
  • Methodology for hacking web applications
  • Common web application vulnerabilities (e.g., SQL injection, XSS)
  • Exploiting encoding and command injection vulnerabilities
  • Practical exercises in web application hacking
  • OWASP Top 10
  • In-depth exploration of the OWASP Top 10 vulnerabilities
  • Hands-on exercises to identify and exploit OWASP vulnerabilities
  • Strategies for secure web application development
  • Wireless Concepts
  • Understanding wireless communication and terminology
  • Wireless encryption standards (WEP, WPA, WPA2)
  • Vulnerabilities in wireless networks
  • - Wi-Fi security best practices
  • Wireless Attacks
  • Attacking wireless access points (APs)
  • Rogue AP attacks and MAC spoofing
  • WPA2 cracking techniques
  • Wi-Fi sniffing and packet analysis
  • Wireless Auditing and Security
  • Wireless network auditing tools and methodologies
  • Securing wireless networks against attacks
  • Practical exercises in wireless network auditing

Developing a robust wireless security strategy

  • Cryptography Basics
  • Essential concepts of cryptography
  • Types of cryptography (symmetric and asymmetric)
  • Encryption algorithms and ciphers
  • Practical exercises in encryption and decryption
  • Data Encryption Standards
  • Data Encryption Standard (DES) and its history
  • Advanced Encryption Standard (AES) and its features
  • Hands-on encryption using AES
  • Cryptography tools and utilities
  • Cryptography Tools
  • Exploring MD5 hash calculators
  • Cryptography tools for data protection
  • Mobile cryptography tools and applications
  • Practical cryptography tool usage scenarios
  • SSL/TLS and Final Review
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
  • The role of SSL/TLS in securing web communications
  • Comprehensive review of cybersecurity concepts
  • Preparing for cybersecurity certifications and career advancement
Preview This Course

Rs. 15,999/-

Rs. 30,999/-

Job Profile to Work

Program Structure

Placement Support

Learning Outcome