Intermediate Cyber Security Course

Key areas covered in intermediate cyber security labs:

  • Introduction to Ethical Hacking
    • Cover the fundamentals of key issues in the information security world
    • The basics of ethical hacking
    • Information security controls
    • Relevant laws
  • Foot Printing and Reconnaissance
    • Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
  • Network Fundamentals:
    • Basic network topology and protocols (TCP/IP)
    • Ping sweeps and port scanning with Nmap to identify open ports
    • Analyzing network traffic with Wireshark
  • Vulnerability Assessment:
    • Identifying common vulnerabilities using vulnerability scanners
    • Understanding CVEs (Common Vulnerabilities and Exploits)
    • Basic remediation strategies for vulnerabilities
  • Password Cracking:
    • Using password cracking tools to attempt to break weak passwords
    • Understanding different password-cracking techniques (dictionary attacks, brute force)
  • Web Application Security:
    • Identifying common web application vulnerabilities (SQL injection, XSS, CSRF)
    • Using web application scanners to detect potential issues
    • Basic web application security best practices
  • Access Control:
    • Exploring different authentication methods (username/password, multi-factor authentication)
    • Understanding user permission management
  • Cryptography Basics:
    • Introduction to encryption algorithms (symmetric, asymmetric)
    • Basic encryption/decryption exercises