DASVM’S Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations.
Course content
Preparatory Sessions – Python & Linux Foundation
- Introduction to Python and IDEs– The basics of the python programming language, how you can use various IDEs for python development like Jupyter, PyCharm, etc.
- Python Basics – Variables, Data Types, Loops, Conditional Statements, functions, decorators, lambda functions, file handling, exception handling etc,.
- Object Oriented Programming– Introduction to OOPs concepts like classes, objects, inheritance, abstraction, polymorphism, encapsulation, etc.
- Hands-on Sessions and Assignments for Practice– The culmination of all the above concepts with real-world problem statements for better understanding.
- Introduction to Linux– Establishing the fundamental knowledge of how Linux works and how you can begin with Linux OS.
- Linux Basics – File Handling, data extraction, etc.
- Hands-on Sessions and Assignments for Practice– Strategically curated problem statements for you to start with Linux.
Introduction to Cyber security & Ethical Hacking
- Need of Cybersecurity
- CIA Triad
- Security Architecture
- Security Governance
- Security Auditing
- Regulations & Frameworks
- Ethical Hacking
- Types of Hackers
- Phases of Ethical Hacking
- Penetration Testing
- Types of Penetration Testing
- Footprinting
- Objectives of Footprinting
- Types of Footprinting
- Footprinting Techniques
Labs:
- Footprinting a website using tools
- Gathering information about Domain through tools
- DNS Footprinting using DNS Interrogation Tools
Network Security
- Security Controls
- Networking Concepts
- Traffic Analysis
- Packet Analysers
- Sniffers
- Firewalls
- SIEM
- VLAN
- VPN
Incident Detection with Security Information and Event Management (SIEM)
- Understand the Basic Concepts of Security Information and Event Management (SIEM)
- Discuss the Different SIEM Solutions
- Understand the SIEM Deployment
- Learn Different Use Case Examples for Application-Level Incident Detection
- Learn Different Use Case Examples for Insider Incident Detection
- Learn Different Use Case Examples for Network Level Incident Detection
- Learn Different Use Case Examples for Host Level Incident Detection
- Learn Different Use Case Examples for Compliance
- Understand the Concept of Handling Alert Triaging and Analysis
Security Operations and Management
- Understand the SOC Fundamentals
- Discuss the Components of SOC: People, Processes and Technology
- Understand the Implementation of SOC
Cryptography
- Types of cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Hash functions
- Digital signatures
- Public Key Infrastructure (PKI)
- Attacks on cryptosystems
Labs:
- Generating and identifying hashes
- Signing a file with digital signatures
Computer Networks & Security
- Introduction to Computer Network
- Computer Networks – Architecture
- Layered architecture
- Open Systems Interconnect (OSI) Model
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Network Scanning
- Enumeration
- Common Network Threats/Attacks
Labs:
- Identify the Network Routes in the System
- DNS lookup and reverse lookup
- Network Path tracing
- Network Analysis
- Network scanning
- Enumeration
Application and Web Security
- Web server architecture
- Web server attacks
- Countermeasures and patch management
- Web application architecture
- Web application attacks
Labs:
- Capturing session ID with Burp Suite
- Local File Inclusion on bWAPP
IdAM (Identity and Access Management)
- Authentication and authorization
- Authentication and authorization principles
- Regulation of access
- Access administration
- IdAM
- Password protection
- Identity theft
Labs:
- Adding and granting permissions to users in Linux
- Identifying phishing websites
Malware Analysis
- Types
- Ransomware
- Detection
- Analysis
Vulnerability Analysis & System Hacking
- Vulnerability Analysis
- Types of Vulnerability Analysis
- Vulnerability Assessment Lifecycle
- Vulnerability Assessment Tools
- Vulnerability Scoring Systems
- Vulnerability Assessments Report
- System Hacking
- Password Cracking
- Privilege escalation
- Executing Applications
- Hiding Files
- Clearing Logs
Labs:
- Scan and Find the vulnerabilities with tools
- Password Breaking
- Install keyloggers and capture keystrokes
Ethical Hacking
- Introduction
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Social Engineering
- Denial-of-Service
- Evading IDS
- Firewalls and Honeypots
- Hacking Web Servers
- Hacking – Wireless Networks
- Mobile Platforms
- IoT
Sniffing and SQL Injection
- Malware and its propagation ways
- Malware components
- Types of malware
- Concept of sniffing
- Types of sniffing
- Types of sniffing attacks
- SQL injection
- Types of SQL injection
- SQL injection Methodologies
Labs:
- Create a trojan by using msfvenom
- Sniff network packets Using Wireshark
- Bypass Authentication using SQL Injection
DoS and Session Hijacking
- DoS attack
- DDoS attack
- Common symptoms of DoS/DDoS attack
- Categories of DoS/DDoS Attack Vectors
- DoS/DDoS detection techniques
- Session hijacking
- Application level session hijacking
- Network level session hijacking
- Intrusion Detection System (IDS)
- Types of Intrusion Detection Systems
- Introduction to Firewalls
- Types of Firewalls
- Introduction to Honeypots
- Evading IDS
Labs:
- DoS Attack using LOIC Tool
- Cross-site Scripting attack
- Demonstration on cookie stealing
To see the full course content Download now
Course Prerequisites
- A keen interest in making a career in the management-level Cyber Security and IT security
- Little experience in any one of the security domains, such as cryptography, access control, operations security, etc.
Who can attend
- Freshers who want to build careers in cybersecurity
- Qualified IT experts looking for their career shift or widen their skills in Cybersecurity
- Anyone interested in Cybersecurity job roles like Network Administrator, System Administrator, Security Analyst, Security Engineer, Ethical Hacker, Pen Tester, and more
Number of Hours: 40hrs
Certification
Key features
- One to One Training
- Online Training
- Fastrack & Normal Track
- Resume Modification
- Mock Interviews
- Video Tutorials
- Materials
- Real Time Projects
- Virtual Live Experience
- Preparing for Certification
FAQs
DASVM Technologies offers 300+ IT training courses with 10+ years of Experienced Expert level Trainers.
- One to One Training
- Online Training
- Fastrack & Normal Track
- Resume Modification
- Mock Interviews
- Video Tutorials
- Materials
- Real Time Projects
- Materials
- Preparing for Certification
Call now: +91-99003 49889 and know the exciting offers available for you!
We working and coordinating with the companies exclusively to get placed. We have a placement cell focussing on training and placements in Bangalore. Our placement cell help more than 600+ students per year.
Learn from experts active in their field, not out-of-touch trainers. Leading practitioners who bring current best practices and case studies to sessions that fit into your work schedule. We have a pool of experts and trainers are composed with highly skilled and experienced in supporting you in specific tasks and provide professional support. 24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts. Our trainers has contributed in the growth of our clients as well as professionals.
All of our highly qualified trainers are industry experts with at least 10-12 years of relevant teaching experience. Each of them has gone through a rigorous selection process which includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating continue to train for us.
No worries. DASVM technologies assure that no one misses single lectures topics. We will reschedule the classes as per your convenience within the stipulated course duration with all such possibilities. If required you can even attend that topic with any other batches.
DASVM Technologies provides many suitable modes of training to the students like:
- Classroom training
- One to One training
- Fast track training
- Live Instructor LED Online training
- Customized training
Yes, the access to the course material will be available for lifetime once you have enrolled into the course.
You will receive DASVM Technologies recognized course completion certification & we will help you to crack global certification with our training.
Yes, DASVM Technologies provides corporate trainings with Course Customization, Learning Analytics, Cloud Labs, Certifications, Real time Projects with 24x7 Support.
Yes, DASVM Technologies provides group discounts for its training programs. Depending on the group size, we offer discounts as per the terms and conditions.
We accept all major kinds of payment options. Cash, Card (Master, Visa, and Maestro, etc), Wallets, Net Banking, Cheques and etc.
DASVM Technologies has a no refund policy. Fees once paid will not be refunded. If the candidate is not able to attend a training batch, he/she is to reschedule for a future batch. Due Date for Balance should be cleared as per date given. If in case trainer got cancelled or unavailable to provide training DASVM will arrange training sessions with other backup trainer.
Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.
Please Contact our course advisor +91-99003 49889. Or you can share your queries through info@dasvmtechnologies.com