Cyber Security Curriculum Quantum Learnings 2020

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

• Introduction of Kali Linux

• Overview of Kali Linux Environment


• Tools in Kali

Cyber Security &


• Kali for Forensics
• Installing additional tools on kali
• Upgrading packages
Ethical Hacking • Basic Useful Commands

• Reconnaissance (Kali Linux)


with • Foot-printing through Web Services
• Findings Company’s Top-level Domains and
Sub Domains
Microsoft Certification • Finding the Geographical Location of Target
• DNS Reconnaissance
• Web server fingerprinting
• People Recon
• Extracting Website Information from
https://archive.org
• Email Footprinting
• Tracing Email Communications
• IP address spoofing
• Mac Spoofing

• Enumerations/Scanning (Kali Linux)


• Scanning Tools
• DNS Enumeration
• Basic Scan (Network/System/web)
• Ports scanning (Network/System/web)
• Aggressive scan (Network/System/web)
• Scanning Beyond IDS/Firewall.
Ethical hacking also known as penetration testing is
a process of identifying security threats and • Penetration Testing
vulnerabilities which can otherwise be exploited by • Vulnerability Analysis (Kali Linux)
potential hackers and offer solutions for the same. • Vulnerability Assessment Tools for Network
• Vulnerability Assessment Tools for
Webservers
• Introduction of Attacks and Hacking
• Vulnerability Assessment Tools for Mobiles
Methodology
• 1: Internet is Integral Part of Business and
Personal Life • Privilege escalation and password Hacking
• 2: Essential Terminology • Linux System
• 3: The Security, Functionality, and Usability • Windows System
Triangle
• Penetration Testing Concepts
• 4: Classes of Attacks
• Denial of Service: • Static App Testing
• DOS/DDOS attack techniques • Practices and Doubt Clearing Session
• Ping floods, SYN flood
• Ping of Death • Reducing Threat
• Tools for DOS • Goals and Learning Objectives - Removing
Privilege
• Windows 7 - Not using admin
• Virus and Worm Concepts
• Windows 8 and 8.1 - Not using admin
• How Attacker Deploy Trojan • Windows 10 - Not using admin
• Trojan Horse Construction kit
• Spyware Deployment • Revision, Assessment, Certification
• Spyware Construction Kit
Project
• Social Engineering Attack
• Phishing
• Fake mailing Program Details
• Fake Calling Training Duration :-
Around One month of Training + Case
• Man in MIDDLE Attack with Kali Linux study and projects on penetration
• How an Attacker Hacks the Network Using testing
Sniffers
• Sniffing Tools With Microsoft MTA Certification 98-367
• Packet sniffing/Protocol Analyzer

• Advance Hacking Web Servers


• Google dork
• Overview of OWASP top 10
• Vulnerability Stack
• SQL Injection Training |Assessment | Certification |Mini Project
• Cross Site Scripting
For Online registration please visit
• Bypass Client-Side Controls
• Authorization Attack Schemes
• LFI/RFI
• Directory Transversal

• Steganography
• Sending Secret Message
• Hiding Text Behind the Image
• Hiding Image Behind Image
• Hiding Text Behind Text
• Creating Secret Undeletable File
Pune: Flat no -5, 2nd floor ,Ghanshyam Park Housing
Society,DholePatil Road Pune
• Mobile Application
www.quantumlearnings.in
• Overview of Mobile Application Architecture
• Installing Genymotions
• Using ADB

You might also like