Cyber Security Online Course Overview
Domain 1 – Introduction & Terminology
- Global Anonymous: Proxy Server, TOR Browser, VPN, SOCKS, RDP, Psiphon, Surface Web, Deep Web, Dark Web, etc.
- Terminology about Web, Servers, Systems, Network Programming Languages, Hacking, IT Security
- Intro to OWASP Top 10 Vulnerability.
- Intro to Bug Bounty & Enterprise Security and Risk Management with IT Security Life Cycle
- Case Studies of Hacking, IT Security & C Forensics.
- Phishing + Live Hacking Impact Demonstration
Domain 2 – Hacking to Explore
- Web Application Penetration Testing based in OWASP TOP 10 Vulnerabilities with Live Ex.
- Live Demonstration of SQLi, XSS, CSRF, and other bugs with tools and with Manual Testing.
- Bug Bounty, Latest CMS Exploitation
- Cryptography & Practical Implementation
- SSL Vulnerabilities & Live Testing
- Mobile Hacking, Sniffing, Virus, Ransomware
- Intro to Carding & Luhn algorithm
Domain 3 – Defence in Depth
- Secure Code Review & Code Brabbing Techniques
- Enterprise Security, Risk Management & Report
- Tools & Web Apps Penetration Testing
- Hacking Attacks & Case Studies
- WAF, Firewall, Honeypots, UTM
- Introduction to Security Compliance
- Introduction to Mobile Apps Pentesting
- Defence for Vulnerabilities
Domain 4 – Hacking Automation
- Virtualization
- Tools for Penetration Testing & Hacking
- Kali Linux & It’s Applications with Uses
- Cloud Security & It’s Fundamentals
- SQLMAP, Metasploit, nmap etc
- Exploits & Incident Response Analysis
- Intro to Exploit Development & Research