Cybersecurity Ethical Hacking - Course Content
Cybersecurity Ethical Hacking - Course Content
Course Objective:
This course is designed to teach student cybersecurity and ethical hacking from the very ground up.
Course will introduce students to both offensive and defensive security.
Course Content:
Module 1: CIA Triad basics, Data State:
Information RISK MANAGEMENT
• Risk Management
• Risk Assessment
• Identify and Valuate Assets
• Identify Threats and Vulnerabilities
Risk Analysis
• Qualitative
• Quantitative
Risk Mitigation/Response
• Reduce (Mitigate)
• Transfer
• Accept /Reject
• Avoid
Risk Monitoring
• Technical (Logical)
• Administrative
• Physical
Module 2. Data Communication Network:
• The OSI model and its use in data communication network
• IP Address, Physical Address, Port Address
• LAN, MAN, WAN
• Internet Infrastructure
• Routers, Switches, Firewall, Load Balancer, DNS, Proxy Server
• On-premises
• Cloud
• Hybrid
• Threat modeling
• Least privilege
• Defense in depth
• Secure defaults
• Fail securely
• Separation of Duties (SoD)
• Zero Trust
• Privacy by design
• Trust but verify
• Shared responsibility
Module 5: Cryptography
• Cryptographic life cycle (e.g., keys, algorithm selection)
• Cryptographic methods (e.g., symmetric, asymmetric)
• Public Key Infrastructure (PKI)
• Key management practices
• Digital signatures and digital certificates
• Non-repudiation
• Integrity (e.g., hashing)
• Need-to-know/least privilege
• Separation of Duties (SoD) and responsibilities
• Privileged account management
• Job rotation
• Service Level Agreements (SLAs)
• Media management
• Media protection techniques
• Detection
• Response
• Mitigation
• Reporting
• Recovery
• Remediation
• Lessons learned
• Travel
• Security training and awareness
• Emergency management
• Duress
Cloud Infrastructure
Cloud Security
• Infrastructure Security
• Network level security, Host level security, Application-level security.
• Data privacy and security Issues.
• Access Control and Authentication in cloud computing.
Module 8: Understanding Software Development Life Cycle (SDLC)
• Development methodologies (e.g., Agile, Waterfall, DevOps,)
• Maturity models (e.g., Capability Maturity Model (CMM), Software Assurance Maturity Model
SAMM)
• Security weaknesses and vulnerabilities at the source-code level
• Security of Application Programming Interfaces (APIs)
• Secure coding practices
• Software-defined security
•
• Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a
critical pre-attack phase of the ethical hacking process
Scanning Networks
Social Engineering
• Learn social engineering concepts and techniques, including how to identify theft attempts,
audit human-level vulnerabilities, and suggest social engineering countermeasures.
Denial-of-Service
• Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, as
well as the tools used to audit a target and devise DoS and DDoS countermeasures and
protections
SQL Injection
• Learn about SQL injection attacks, evasion techniques, and SQL injection countermeasures.
• OWASP top 10.
*****************************