Key Highlights of Cyber Security Course in Bangalore
Cyber security has emerged as a very important aspect for all major organizations. Since all organizations are digitally driven, there is a need to protect the data from harm. Get trained to become a cyber security professional and prevent harm for your data from viruses, malware, and hackers. In this training, candidates can learn about advanced methodologies such as reverse engineering, writing virus codes etc.
Course contents
Introduction to Ethical Hacking
- What is Ethical Hacking
- Data Breaches history
- Information security
- OS Attacks
- Application level attacks
- Concepts of hacking
- Scope of ethical hacking
- Information security architecture
- Penetration testing
- Security and cyber security laws
Hacking types
- System hacking
- Goals of system hacking
- Certified ethical hacker methods
- Steps in hacking
- Password decoding
- Brute attack
- Rule-based attack
- What is a keylogger
- Trojan and spyware
- Hash engine attack
- Distributed network attack
- Rootkits
- Covering the tracks
Footprinting
- Introduction to footprinting
- Objectives of footprinting
- Methodologies associated to footprinting
- Group information
- Hacking techniques in google
- Competitive intelligence tracking
- Tools used for footprinting
- Footprinting penetration test
Network Scanning
- Scanning a network
- What is scanning
- Creating a custom packet
- IPv6 network scan
- Network discovery tool
- Understanding anonymizer
- Spoofing an IP address
Malware Threats
- How does malware enter the system
- What are Trojans
- Infecting systems with Trojans
- Construction kit
- Galaxy crypter
- Trojan and proxy server
- Botnet Trojans
- Boot sector virus
- Stealth viruses
- Virus sensor systems
- Malware analysis procedure
Social Engineering attacks
- Introduction to social engineering attacks
- Vulnerability in enterprises
- Steps in social engineering
- Warning signs
- DOS and DDOS
- Protection against DDOS attacks
Session Hacking
- Introduction to Session Hacking
- Process of session hacking
- Spoofing
- Application level session hacking
- Network level session hacking
- Tools used for session hacking
- Ethical hacking and penetration testing
Encryption Techniques
- Encryption methods
- Cryptography
- Hashing algorithm
- Tools used for cryptography
- Attacks in cryptography
- Public key infrastructure
- Public key encryption