0% found this document useful (0 votes)
155 views

Cyber Security Course Outline

The cyber security course outline covers 21 modules on topics ranging from introduction to cyber security, networking, web applications, penetration testing, programming, operating systems, and forensic investigation. Some of the key areas covered include cryptography, protocols, penetration testing methodology, Python programming, Windows and Linux command line scripting, password cracking, buffer overflow attacks, Metasploit, and forensic analysis. The modules provide in-depth instruction on both offensive and defensive security concepts, tools, and techniques.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
155 views

Cyber Security Course Outline

The cyber security course outline covers 21 modules on topics ranging from introduction to cyber security, networking, web applications, penetration testing, programming, operating systems, and forensic investigation. Some of the key areas covered include cryptography, protocols, penetration testing methodology, Python programming, Windows and Linux command line scripting, password cracking, buffer overflow attacks, Metasploit, and forensic analysis. The modules provide in-depth instruction on both offensive and defensive security concepts, tools, and techniques.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Security Course Outline

Module 1: “Introduction”
●Welcome
●The information Security Field
●InfoSec Culture
●Career Opportunities
●Information Security Terms
●Cryptography and VPNs
●Wireshark Introduction
●Binary Arithmetic Basics
●Bitwise Operations
●Hexadecimal Arithmetic

Module 2: “Networking”
● Protocols
● IP
● Routing
● Link Layer Devices and Protocols
● TCP and UDP
● Firewalls and Network Defenses
● DNS
● Wireshark

Module 3: “Web Applications”


● Introduction
● HTTP Protocol Basics
● HTTP Cookies
● Sessions
● Same Origin Policy
● Burp Suite

Module 4: “Penetration Testing”


● Introduction
● Lifecycle of Penetration Test
● Engagement
● Information Gathering
● Foot printing and Scanning
● Vulnerability Assessment
● Exploitation
● Reporting

Module 5: “Introduction to Programming”


● What is programming
● Low and high-level languages
● Programming vs. Scripting
● Basic concepts
● Variables
● Functions
● Conditional Statements
● Loops
● Understanding the Code
● Conclusion

Module 6: “Python”
● What is python
● Variables and types
● Input / Output
● Control flow
● Lists
● Dictionaries
● Functions
● Modules
● Scripting for pen testers
● Network sockets
● Port scanning
● Backdoor
● HTTP
● Login brute forcing
● Python assisted hacking

Module 7: “Command Line Scripting”


● Bash shell
● Bash environment
● Bash commands and programs
● Bash output redirectors and special characters
● Bash conditional statements and loops
● Windows command line
● Windows environment
● Windows commands and programs
● Windows output redirectors and special characters
● Windows conditional statements and loops

Module 8: “PENETRATION TESTING”


● Information gathering
● Introduction
● Open-source Intelligence
● Subdomain enumeration
● Importance of information gathering

Module 9: “Footprinting and scanning”


● Mapping network
● OS fingerprinting
● Port Scanning

Module 10: “Vulnerability Assessment”


● Vulnerability assessment
● Nessus
Module 11: “Web Application Attacks”
● Introduction
● HTTP/S Protocol Basics
● Web server fingerprinting
● HTTP Verbs
● Directories and file enumeration
● Google Hacking
● Cross Site Scripting (XSS)
● SQL Injections
● Encoding
● Web application proxies
● Other common web attacks
● File and resource attacks

Module 12: “System Attacks”


● Malware
● Viruses
● Trojan Horses
● Backdoors
● Rootkits
● Bootkits
● Adware
● Spyware
● Greyware
● Dialer
● Keylogger
● Bots
● Ransomware
● Data-stealing malware
● Worms

Module 13: “Password attacks”


● Brute force algorithm
● Brute forcing weaknesses
● John the Ripper
● Dictionary attacks
● Hashcat
● Conclusion

Module 14: “Buffer Overflow Attacks”


● Buffers
● Stack
● The stack in applications
● How buffer overflow attacks work

Module 15: “Network Attacks”


● Authenticating Cracking
● Brute force vs. Dictionary Attacks
● Weak and default credentials
● Authentication cracking tools
● Hydra

Module 16: “Windows shares”


● NetBIOS
● Shares
● UNC Paths
● Administrative shares
● Badly configured shares

Module 17: “Null Sessions”


● Enumerating windows shares
● Checking for Null Sessions
● Exploiting Null sessions
● About null sessions

Module 18: “ARP Poisoning”


● ARP poisoning actors
● Gratuitous ARP replies
● Forwarding and mangling packets
● Local to remote Man in the Middle
● Dsniff Arpspoof

Module 19: “Metasploit”


● MSFConsole
● Identifying a vulnerable service
● Searching
● Configuring an exploit
● Configuring a payload
● Running an exploit

Module 20: “Meterpreter”


● Bind and reverse
● Launching meterpreter
● Sessions
● Information gathering with meterpreter
● Privilege escalation
● Dumping the password database
● Exploring the victim system
● Uploading and downloading files
● Running OS Shell
● Beyond Remote Code Execution

Module 21: “Forensic Investigation”


● Computer Forensics Today
● Computer Forensics Investigation Process
● Hard Disks & File Systems
● Data Acquisition
● Anti-Forensics Techniques
● Operating System Forensics
● Network Forensics
● Web Attack Investigation
● Database Forensics
● Forensics with the Cloud
● Malware
● Email Investigation
● Mobile
● Forensic Reporting
● Course Summary

You might also like