Expert Cyber Security Course

Key areas covered in expert cyber security labs:

  • Introduction to Ethical Hacking
    • Cover the fundamentals of key issues in the information security world
    • The basics of ethical hacking
    • Information security controls
    • Relevant laws
  • Foot Printing and Reconnaissance
    • Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
  • Network Fundamentals:
    • Basic network topology and protocols (TCP/IP)
    • Ping sweeps and port scanning with Nmap to identify open ports
    • Analyzing network traffic with Wireshark
  • Vulnerability Assessment:
    • Identifying common vulnerabilities using vulnerability scanners
    • Understanding CVEs (Common Vulnerabilities and Exploits)
    • Basic remediation strategies for vulnerabilities
  • Password Cracking:
    • Using password cracking tools to attempt to break weak passwords
    • Understanding different password-cracking techniques (dictionary attacks, brute force)
  • Web Application Security:
    • Identifying common web application vulnerabilities (SQL injection, XSS, CSRF)
    • Using web application scanners to detect potential issues
    • Basic web application security best practices
  • Access Control:
    • Exploring different authentication methods (username/password, multi-factor authentication)
    • Understanding user permission management
  • Cryptography Basics:
    • Introduction to encryption algorithms (symmetric, asymmetric)
    • Basic encryption/decryption exercises
  • Hacking Web Servers
    • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
  • Hacking Web Applications
    • Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.

Splunk Admin and Developer

  • Splunk Searching
    • Run basic searches
    • Use auto-complete to help build a search
    • Set the time range of a search
    • Identify the contents of search results
    • Refine searches
    • Use the timeline
    • Work with events
    • Control a search job
    • Save search results
  • Using Fields in Searching
    • Understand fields
    • Use fields in searches
    • Use the fields sidebar
    • Use search modes (fast, verbose, and smart)
  • Create Reports
    • Save a search as a report
    • Edit reports
    • Create reports that display statistics (tables)
    • Create reports that display visualizations (charts)
  • Create Dashboards
    • Create a dashboard
    • Add a report to a dashboard
    • Add panel to a dashboard
    • Edit a dashboard
    • Create Interactive dashboard
    • Create Cascade dashboard
  • Creating Alerts
    • Describe alerts
    • Create alerts
    • View fired alerts