Training on Cyber Security , Risk Management and Ethical Hacking
Engr. Md. Mushfiqur Rahman

Engr. Md. Mushfiqur Rahman

View Profile

Training on Cyber Security , Risk Management and Ethical Hacking (1st Batch)

TK 20000 TK 15000

Start Date : 2020-03-15  

Total Class : 30   Total Hours: 90

Location : D F Tower (Level-11A) Skill Jobs Digital Lab Skill Jobs Digital Lab, House # 11 (Level-11A), Road # 14, Dhanmondi, Shobhanbag, Dhaka-1209

Registration Now

Course Summary

  • Module 1: Cryptographic Tools and Techniques
  • Module 2: Comprehensive Security Solutions
  • Module 3: Securing Virtualized, Distributed, and Shared Computing
  • Module 4: Host Security
  • Module 5: Application Security and Penetration Testing
  • Module 6: Risk Management
  • Module 7: Policies, Procedures, and Incident Response
  • Module 8: Security Research and Analysis
  • Module 9: Enterprise Security Integration
  • Module 10: Security Controls for Communication and Collaboration
  • Module 11. The Technical Foundations of Hacking
  • Module 12. Footprinting and Scanning
  • Module13. Enumeration and System Hacking
  • Module 14. Web Server Hacking, Web Applications, and Database Attacks
  • Module 15. Sniffing and Spoofing
  • Module 16. Vulnerability Analysis
  • Module 17. Denial-of-Service
  • Module 18. Session Hijacking
  • Module 19. Evading IDS, Firewalls, and Honeypots 

Course Content

Module 1: Cryptographic Tools and Techniques

  • The History of Cryptography
  • Cryptographic Services
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hybrid Encryption
  • Hashing
  • Digital Signatures
  • Public Key Infrastructure
  • Implementation of Cryptographic Solutions
  • Cryptographic Attacks

Module 2: Comprehensive Security Solutions

  • Advanced Network Design
  • TCP/IP
  • Secure Communication Solutions
  • Secure Facility Solutions
  • Secure Network Infrastructure Design

Module 3: Securing Virtualized, Distributed, and Shared Computing

  • Enterprise Security
  • Cloud Computing
  • Virtualization
  • Virtual LANs
  • Virtual Networking and Security Components
  • Enterprise Storage

Module 4: Host Security

  • Firewalls and Network Access Control
  • Host-Based Firewalls
  • Trusted Operating Systems
  • Endpoint Security Solutions
  • Anti-malware
  • Host Hardening
  • Asset Management
  • Data Exfiltration
  • Intrusion Detection and Prevention
  • Network Management, Monitoring, and Security Tools

Module 5: Application Security and Penetration Testing

  • Application Security Testing
  • Specific Application Issues
  • Application Sandboxing
  • Application Security Frameworks
  • Secure Coding Standards
  • Application Exploits
  • Escalation of Privilege
  • Improper Storage of Sensitive Data
  • Cookie Storage and Transmission
  • Malware Sandboxing
  • Memory Dumping
  • Process Handling at the Client and Server
  • Security Assessments and Penetration Testing

Module 6: Risk Management

  • Risk Terminology
  • Identifying Vulnerabilities
  • Operational Risks
  • The Risk Assessment Process
  • Best Practices for Risk Assessments

Module 7: Policies, Procedures, and Incident Response

  • A High-Level View of Documentation
  • Business Documents Used to Support Security
  • Documents and Controls Used for Sensitive Information
  • Training and Awareness for Users
  • Auditing Requirements and Frequency
  • The Incident Response Framework
  • Incident and Emergency Response

Module 8: Security Research and Analysis

  • Apply Research Methods to Determine Industry Trends and Impact to the Enterprise
  • Analyze Scenarios to Secure the Enterprise

Module 9: Enterprise Security Integration

  • Integrate Enterprise Disciplines to Achieve Secure Solutions
  • Integrate Hosts, Storage, Networks, and Applications into a Secure Enterprise Architecture

Module 10: Security Controls for Communication and Collaboration

  • Selecting the Appropriate Control to Secure Communications and Collaboration Solutions
  • Integrate Advanced Authentication and Authorization Technologies to Support Enterprise

Objectives

  • Implement Security Activities across the Technology Life Cycle

Module 11. The Technical Foundations of Hacking

  • Foundation Topics
  • The Attacker’s Process
  • The Ethical Hacker’s Process
  • Security and the Stack

Module 12. Footprinting and Scanning

  • Foundation Topics
  • Overview of the Seven-Step Information-Gathering Process
  • Information Gathering
  • Determining the Network Range
  • Identifying Active Machines
  • Finding Open Ports and Access Points
  • OS Fingerprinting
  • Fingerprinting Services
  • Mapping the Network Attack Surface

Module13. Enumeration and System Hacking

  • Foundation Topics
  • Enumeration
  • System Hacking

Module 14. Web Server Hacking, Web Applications, and Database Attacks

  • Foundation Topics
  • Web Server Hacking
  • Web Application Hacking
  • Database Hacking

Module 15. Sniffing and Spoofing

  • Sniffing and spoofing network traffic
  • Sniffing network traffic
  • Basic sniffing with tcpdump
  • More basic sniffing with WinDump (Windows tcpdump)
  • Packet hunting with Wireshark
  • Dissecting the packet
  • Swimming with Wireshark

Module 16. Vulnerability Analysis
Module 17. Denial-of-Service
Module 18. Session Hijacking
Module 19. Evading IDS, Firewalls, and Honeypots