Introduction to cybersecurity
Overview: Intermediate cybersecurity skills focusing on threat detection, risk
management, and security controls.
Duration: 2 month
Topics Covered:
- Exploring ethical hacking
- Associated protocols
- Gathering information about target computer systems - footprinting and investigation
- Scanning computers in the networks
- Vulnerabilities associated with systems
- Exploring malware threats and their countermeasures
- Enumeration - listing the system/users and connecting them
- Gaining access to systems - hacking
- Monitoring and capturing data packets using sniffing
- Restricting the system access - denial of service (DoS attack)
- Tricking people to gather confidential information - social engineering
- Web servers and threats associated with it
- Web applications and threats associated with it
- Controlling user session with authenticated TCP connection session hacking
- Injecting code in data-driven applications - SQL injection
- Hacking mobile platforms and threats associated with it
- Encrypting and decrypting the code - cryptography and its types
- Evading IDS, firewalls, and honeypots
- Wireless networks and threats associated with it
Learning Outcomes:
Implement security measures, manage risks, and respond to security incidents.
Enroll Now