Introduction to Cyber Security -
- Overview and Importance of Cyber Security
- Fundamental concepts of security
- Fundamentals of Networking- TCP/IP Protocols
- Network Defense Tools
- Introduction to Cybercrime
- Python for Cyber Security
Operating System Security -
- Security features in operating systems(Windows, Linux, macOS)
- User account management and permissions
- Bootstrapping Technology
Encryption -
- Encryption and Decryption
- Cryptography Tools
- Cryptography Protocols (SSL/TLS)
- Digital Signature
- Digital Certificate
Introduction to Ethical Hacking -
- What is Ethical Hacking?
- Types of Hackers
- Security Challenges
- Scanning
- Types of Attacks
- Vulnerability Research
- Effects of Hacking
- Penetration Testing
- Enumeration
Footprinting -
- What is Footprinting
- Methods of Footprinting
- Benefits of Footprinting
- DNS Lookup
- Analyzing Email Headers
- Mirroring Websites
- Extracting Website Informations
- Tracking Emails Communications
- Tracking Mobile Communications
Google Hacking -
- Google Hacking Techniques
- Footprinting using Google Hacking Technique
- Google Advance Search Operators
Scanning -
- Types of Scanning
- Three Way Handshake
- NMAP Tool
- Banner Grabbing
- Proxy Servers
- OS Fingerprinting
- Proxy Tools
- Checking the Status of Ports
System Hacking -
- Password Cracking Techniques
- Password Complexity
- Types of Password Attacks
- Keylogger and AntiKeyloggers
- Spyware and Antispyware
- Steganography Techniques
Internet Security -
- Online Gaming Risks
- Child Online Safety
- Guidelines for Internet Security
- Internet Security Laws
Network Security -
- Network firewall
- Securing Wireless Networks
- Wi-Fi Security Protocols
- Network Security Threats
- VPN
Virus Detection and Anti Virus Tools
Social Engineering Through Impersonation On Social networking Sites