Course Rate: INR 80000.00
Duration: 12 Months
About the Course:
Cyber Security & Ethical Hacking Course Syllabus
(*Network Security | Penetration Testing | Cryptography | Incident Response | Ethical Hacking*)
This **comprehensive syllabus** covers **cybersecurity fundamentals, ethical hacking, penetration testing, cryptography, and cloud security**, preparing you for **real-world** cybersecurity roles.
---
## **1. Introduction to Cyber Security & Ethical Hacking**
- What is Cyber Security?
- Importance of Cyber Security & Ethical Hacking
- Different Types of Cyber Attacks
- Cybersecurity vs Ethical Hacking vs Penetration Testing
- Cyber Laws & Compliance (GDPR, HIPAA, ISO 27001)
---
## **2. Networking & Security Basics**
- Networking Fundamentals (OSI & TCP/IP Models)
- IP Addressing, Subnetting & VPNs
- Network Security Basics (Firewalls, IDS/IPS, Proxies)
- Wireshark for Packet Analysis
- Secure Network Configuration
---
## **3. Cyber Threats & Vulnerabilities**
- Common Threats: Malware, Ransomware, Phishing, DDoS Attacks
- Vulnerability Assessment & Management
- Zero-Day Vulnerabilities
- Threat Intelligence & Analysis
---
## **4. Linux & Windows Security**
- Linux Command Line for Security Professionals
- User Management & Permissions
- Windows Security Policies & Hardening
- Active Directory Security
- Log Analysis & SIEM Tools (Splunk, ELK Stack)
---
## **5. Ethical Hacking & Penetration Testing**
- Ethical Hacking Methodology
- Penetration Testing Phases
- Setting Up a Hacking Lab (Kali Linux, Metasploitable)
- Information Gathering (Reconnaissance, Footprinting, OSINT)
- Scanning & Enumeration (Nmap, Netcat, Nikto)
---
## **6. Exploitation & Vulnerability Assessment**
- Web Application Security (OWASP Top 10)
- SQL Injection, XSS, CSRF, Command Injection
- Server-Side & Client-Side Attacks
- Buffer Overflow Exploits
- Exploiting Misconfigurations
---
## **7. Wireless & Mobile Security**
- Wi-Fi Security & Attacks (WEP, WPA, WPA2 Cracking)
- Wireless Packet Sniffing & MITM Attacks
- Mobile Security (Android & iOS Vulnerabilities)
- Mobile App Penetration Testing
---
## **8. Cryptography & Encryption**
- Basics of Cryptography (Symmetric vs Asymmetric Encryption)
- Hashing Algorithms (MD5, SHA-256)
- Digital Signatures & Certificates (SSL/TLS)
- Steganography & Data Hiding
- Secure Communication Protocols (PGP, SSH)
---
## **9. Social Engineering & Phishing Attacks**
- Types of Social Engineering Attacks
- Email & Website Phishing Techniques
- Spear Phishing & Whaling Attacks
- Defense Mechanisms & Awareness Training
---
## **10. Cloud Security & DevSecOps**
- Introduction to Cloud Security (AWS, Azure, GCP)
- Cloud Threats & Attack Vectors
- Secure Cloud Configurations
- DevSecOps & Secure CI/CD Pipelines
- Container Security (Docker & Kubernetes)
---
## **11. Digital Forensics & Incident Response**
- Introduction to Digital Forensics
- Evidence Collection & Preservation
- Incident Response Frameworks (NIST, SANS)
- Malware Analysis & Reverse Engineering
- Memory Forensics & Log Analysis
---
## **12. Bug Bounty & Web Application Security**
- Introduction to Bug Bounty Hunting
- Finding & Reporting Vulnerabilities
- Responsible Disclosure Programs
- Platforms (HackerOne, Bugcrowd)
---
## **13. Security Tools & Frameworks**
- Kali Linux, Metasploit, Burp Suite
- Nmap, Wireshark, Aircrack-ng
- Nessus, OpenVAS for Vulnerability Scanning
- OSINT Tools (Shodan, Maltego)
---
## **14. Compliance & Cyber Security Standards**
- ISO 27001, NIST Cybersecurity Framework
- GDPR & Data Protection Laws
- PCI-DSS for Payment Security
- HIPAA for Healthcare Security
---
## **15. Real-World Cyber Security Project**
- Ethical Hacking Challenge
- Secure Application Development
- Incident Handling & Reporting
- Cybersecurity Risk Assessment
---