Email: info@rkwebconsulting.com | Phone Number: +91-7206375331

Cyber Security Training

shape
shape
shape
shape
shape
shape
shape
shape

Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, and data from attack, damage, and unauthorized access. Cyber security courses teach professionals to spot vulnerabilities, fend off attacks, and immediately respond to emergencies.

Why should you attend this course?

  • The Certified Cybersecurity Expert is a completely hands-on, real-world oriented security certification. This course is designed by experienced security professionals focusing on delivering the best and updated knowledge, and ensures that you get personally mentored by the best in the business.

    Check out the profiles of our team members to know more about your mentors. This is a group of people who have worked on prestigious international projects, presented at the leading security conferences around the world, constantly working on various research and developments, and written numerous books and articles.

    The best part about the Cybersecurity Expert Certification program is the fact that you get a chance to try your learned skills on hands-on practical lab sessions. This makes sure that the learned concepts are easily imbibed by you during the programs.

    The upside of joining this program is that you will be able to cover a wide variety of topics, starting from the basics, and then leading up to compliance standards, and even digital forensics and cybercrime investigations.

Table of Contents

    • Session 1 – Ethical Hacking
      • Information Security, Ethical Hacking & Network
      • Social engineering & reconnaissance
      • Network scanning
      Session 2 – Ethical Hacking
      • Enumeration
      • Hacking System and Networks
      Session 3 – Ethical Hacking
      • Metasploit & VA Tools
      Session 4 – Ethical Hacking
      • Web Application & web Security
      • Beyond OWASP
      • Scanners and Interpreting Report
      • Practical Tips for Defending web application
      Session 5 – Ethical Hacking
      • Wireless Security
      • Cryptography, steganography and malware
      Session 6 – Database Security
      • Database Fundamentals – Data, database, metadata, DBMS
      • Difference between DBMS and RDBMS
      • Database Management System – Database client- server Architecture
      Session 7 – Database Security
      • Database Administrator, Database Security Issues,
      • AAA in Database
      • Auditing in Database
      Session 8 – Web Application Security
      • Web Application Vulnerabilities
      • OWASP Top 10
      Session 9 – Web Application Security
      • Secure Coding Techniques
      • Threat Modeling
      • Secure Coding Methods
      Session 10 – Network Security Auditing
      • Network Attacks – Types and Sources
      • Architecture Security
      • Secure Network design
      • Concept of Network Segregation (DMZ)
      • Administration Controls
      • Security Auditing Methodologies
      • Network Device Configuration Review
      • Firewall Configuration Review
      • Intrusion Controls (IDS/IPS) Config review – Snort
      • Testing VPN Networks
      • WLAN Auditing
      Session 11 – Operating System Auditing
      • Windows  Server Auditing
      • Linux Server Auditing
      Session 12 – Digital Forensic
      • Security Operation Center Concepts
      • Designing SOC
      • 6 A’s of Forensic, CERT, cyber cells in India
      • Legal Issues, chain of custody
      • Types of Cyber Crime
      • Tools and Techniques
      • Disk Forensics
      • Incident response- Order of Volatility, Incident Response Methodologies
      • Live Response (tools like Sysinternal)
      Session 13 – Disk Forensics
      • Using FTK, DumpIT, SIFT,DEFT
      • File System Fundamentals.
      • Evidence file formats , Understanding the Hard Disk, Password cracking, Physical Protection of Evidence
      • Disk Forensic Analysis-Forensic analysis using FTK Analyzer, TSK tools (Autopsy)
      Session 14 – Memory Forensics
      • Disk Forensic Analysis-Encase Forensic Analysis – Encrypts basic, Encase Demo, Browser Forensic Analysis – IEF, Generating reports – Articulation
      • Memory Forensics, Volatility Framework,
      • Network Forensics – Router Forensic, Investigating Switches, Investigating Routers
      Session 15 – ISMS
      • Information Security Management System
      Session 16 – BCM, PCI DSS
      • Business Continuity Management
      • Payment Card Industry Data Security Standard

Book Your Demo Class.

Contact Details