Introduction to Cyber Security -

  • Overview and Importance of Cyber Security
  • Fundamental concepts of security
  • Fundamentals of Networking- TCP/IP Protocols
  • Network Defense Tools
  • Introduction to Cybercrime
  • Python for Cyber Security

Operating System Security -

  • Security features in operating systems(Windows, Linux, macOS)
  • User account management and permissions
  • Bootstrapping Technology

Encryption -

  • Encryption and Decryption
  • Cryptography Tools
  • Cryptography Protocols (SSL/TLS)
  • Digital Signature
  • Digital Certificate

Introduction to Ethical Hacking -

  • What is Ethical Hacking?
  • Types of Hackers
  • Security Challenges
  • Scanning
  • Types of Attacks
  • Vulnerability Research
  • Effects of Hacking
  • Penetration Testing
  • Enumeration

Footprinting -

  • What is Footprinting
  • Methods of Footprinting
  • Benefits of Footprinting
  • DNS Lookup
  • Analyzing Email Headers
  • Mirroring Websites
  • Extracting Website Informations
  • Tracking Emails Communications
  • Tracking Mobile Communications

Google Hacking -

  • Google Hacking Techniques
  • Footprinting using Google Hacking Technique
  • Google Advance Search Operators

Scanning -

  • Types of Scanning
  • Three Way Handshake
  • NMAP Tool
  • Banner Grabbing
  • Proxy Servers
  • OS Fingerprinting
  • Proxy Tools
  • Checking the Status of Ports

System Hacking -

  • Password Cracking Techniques
  • Password Complexity
  • Types of Password Attacks
  • Keylogger and AntiKeyloggers
  • Spyware and Antispyware
  • Steganography Techniques

Internet Security -

  • Online Gaming Risks
  • Child Online Safety
  • Guidelines for Internet Security
  • Internet Security Laws

Network Security -

  • Network firewall
  • Securing Wireless Networks
  • Wi-Fi Security Protocols
  • Network Security Threats
  • VPN

Virus Detection and Anti Virus Tools

Social Engineering Through Impersonation On Social networking Sites