Advanced Cyber Security Course
Content Introduction to Ethical Hacking
- Fundamentals of information security challenges
- Basics of ethical hacking concepts
- Understanding security controls
- Overview of relevant cyber laws
Foot-printing & Reconnaissance
- Latest tools and techniques for reconnaissance
- Performing foot-printing as a pre-attack phase
Network Fundamentals
- Basics of network topology & TCP/IP protocols
- Ping sweeps & Nmap scanning for open ports
- Traffic capture and analysis with Wireshark
Vulnerability Assessment
- Identifying vulnerabilities using scanners
- Understanding CVEs (Common Vulnerabilities & Exposures)
- Applying remediation strategies
Password Cracking
- Using password cracking tools
- Techniques: dictionary attacks & brute force
Web Application Security
- Detecting SQL Injection, XSS, CSRF
- Running web application vulnerability scans
- Implementing best practices for web security
Access Control
- Authentication methods: username/password, MFA
- User roles & permission management
Cryptography Basics
- Overview of symmetric & asymmetric encryption
- Hands-on encryption/decryption exercises
Splunk Admin & Developer Module Splunk Searching
- Running basic searches
- Using auto-complete for query building
- Setting time ranges for searches
- Understanding search results
- Refining searches & using timelines
- Working with events
- Managing search jobs
- Saving search results
Using Fields in Searches
- Understanding fields & their usage
- Applying fields within search queries
- Leveraging the fields sidebar
- Exploring search modes: Fast, Verbose, Smart
Creating Reports
- Saving searches as reports
- Editing and customizing reports
- Building statistical reports (tables)
- Creating visualizations (charts & graphs)