W4E-CCSP

World4Engineers Certified Cyber Security Professional

Course Description

This course aims at developing Cyber Security professionals who are equipped with high-level data security over various devices, systems, and networks. This course will help students to understand basic architectures and vulnerabilities of various systems. We follow a systematic approach to analyzing and prevent vulnerabilities of many systems.

Course Prerequisite

  • Strong knowledge of TCP/IP
  • Strong knowledge of ISO OSI Model
  • Basics of Networking & Basics of Information Security

Course Curriculum

  1. Introduction To Cyber Security
    • Introduction To Information Security
    • Information Warfare
    • Hacking Concepts
    • Information Security Controls
    • Information Security Policies
    • Physical Security
    • Incident Management
    • Vulnerability Assessment & Research
    • Introduction To Penetration Testing
  2. Virtualization & Linux
    • Introduction To Virtualization
    • Virtualization Tools
    • Penetration Testing OS
    • Kali Linux
  3. Reconnaissance & Foot-Printing
    • Reconnaissance
      1. Competitive Intelligence
    • Foot-Printing
      1. Analyzing The DNS Record
      2. Getting Network Routing Information
      3. Utilizing Search Engine
  4. Network Scanning
    • Identify Target Machine
    • OS Finger Printing
  5. Network Enumeration
    • Port Scanning
    • Network Scanner
    • SMB Enumeration
    • SNMP Enumeration
    • VPN Enumeration
  6. System Hacking
    • Securing Passwords
    • Escalating Privileges
    • Hiding Files
    • Steganography
  7. Securing From Trojans & Backdoors
    • Trojans
      1. Introduction
      2. Assessment
      3. Prevention
    • Backdoor
      1. Introduction
      2. Assessment
      3. Prevention
  8. Securing From Viruses & Worms
    • Viruses
      1. Introduction
      2. Assessment
      3. Prevention
    • Worms
      1. Introduction
      2. Assessment
      3. Prevention
  9. Sniffing
    • Introduction To Sniffers
    • Working Of Sniffers
    • Arp Spoofing
    • Arp Poisoning
    • Mac Flooding
    • DNS Spoofing
    • Counter Measures
  10. Social Engineering
    • Art Of Manipulation
    • Types Of Social Engineering Attacks
    • Attack Process
    • Phishing
    • Counter Measures
  11. Denial Of Service(Dos)
    • Introduction
    • Working
    • DDoS
    • Bots / Botnets
    • SYN Flood Attack
    • Smurf Attack
    • Counter Measure
  12. Session Hijacking
    • Introduction
    • Threats
    • Counter Measures
  13. Securing Webservers
    • Introduction Of Webservers
    • Types Of Vulnerabilities
    • Counter Measures
  14. Web Applications
    • Introduction To Web Application
    • Vulnerabilities In Web Application
    • Hacking Various Web Applications
    • Counter Measures
  15. SQL Injection
    • Introduction To SQL Injection
    • Vulnerabilities Analysis
    • SQL Injection Attack
    • Counter Measures
  16. Securing Wireless Networks
    • Introduction To Wi-Fi And Ethernet
    • Authentication & Cracking Technicians
    • Understanding WEP
    • Understanding WPA / Wpa2-Psk
    • Counter Measure
  17. Securing Mobile Platforms
    • Android
      1. Understanding Android OS
      2. Android Kernel
      3. Rooting
      4. Various Security Hacks
    • iOS
      1. Understanding iOS
      2. Jail Breaking
      3. Various Security Hacks
    • Mobile Security Guidelines And Standards
  18. Bypassing Network Security
    • IDS
      1. Introduction To IDS
      2. Evasion Technics
    • Firewall
      1. Introduction To Firewall
      2. Evasion Techniques
    • Honeypot
      1. Introduction To Honeypot
      2. Evasion Techniques
  19. Buffer Overflow
    • Introduction To Buffer Overflow
    • Types Of Buffer Overflow
    • Method Of Detection
    • Counter Measure
  20. Art Of Cryptography
    • Introduction To Cryptography
    • Types Of Cryptography
    • Cryptographic Algorithms
    • Cryptographic Attacks
  21. Secure Cloud Computing
    • Introduction To Cloud Computing
    • Working
    • Threats
    • Counter Measure
  22. Art Of Penetration Testing & Security Auditing
    • Introduction Of Penetration Testing
    • Methods & Types
    • Vulnerability Assessment Vs Penetration Testing
    • Penetration Testing Process
    • Security Testing Methodologies
    • Penetration Testing Legal Frameworks

Course Fees

Rs 10,000/-

Apply for Course