About Course
Modern life now depends on online services. In the information age, we must have a deeper
understanding of cyber security threats. Explore the world of cybersecurity and learn how to p
rotect your data from attacks and vulnerabilities. Get the skills you need to become a
cybersecurity expert.
Course Content
Week 1
Cyber Security Fundamentals
-
Information Security Fundamentals
-
Characters in Information Security
-
Cyber Security Abbreviations
-
Cyber Security Terms (Glossary)
-
Cryptography Fundamentals
-
Cryptography
-
Symmetric Encryption
-
Asymmetric Encryption
-
Differences in Asymmetric and Symmetric Encryption
-
Symmetric Encryption Key
-
Asymmetric Encryption Key
-
Hashing
-
Encoding
Week 2
Basic Linux
-
Introduction to Linux
-
Basic Linux Commands
-
Linux User and Group Management
-
Important Files and Directories on Linux Systems
-
File/Directory Authorizations on Linux Systems
-
Text Editors
-
Process Management on Linux Systems
-
Package Management on Linux Systems
-
Service Management
-
Network Operations on Linux Systems
Week 3
Basic Windows
-
Introduction to Windows Systems
-
Basic Windows Commands
-
User Actions on Windows Systems
-
Important Folders and Files
-
File and Folder Search Operations
-
Processes
-
Network Operations
-
File Downloads on Windows Systems
-
Scheduled Tasks on Windows Systems
-
Service Management on Windows Systems
Week 4
Basic Network Information
-
Wireshark
-
Network Fundamentals
-
TCP/IP Architecture
-
OSI Model
-
Important Network Protocols
-
HTTP (Hyper-Text Transfer Protocol)
-
FTP (File Transfer Protocol)
-
SMTP (Simple Mail Transfer Protocol)
-
DNS (Domain Name Server)
-
Telnet (Telecommunication Network)
-
SSH (Secure Shell)
-
NFS (Network File System)
-
SMB (Server Message Block)
-
DHCP (Dynamic Host Configuration Protocol)
-
TCP (Transmission Control Protocol/Internet Protocol)
-
UDP (User Datagram Protocol)
-
IP (Internet Protocol)
-
NAT (Network Address Translation)
-
ICMP (Internet Control Message Protocol)
-
ARP (Address Resolution Protocol)
-
Important Network Devices
Week 5
Understanding Tunneling and Netcat Structure
-
Netcat and Derivatives
-
netcat
-
Ncat
-
powercat
-
SSH Tunneling
Week 6
Programming for Cyber Security
-
Python Basics
-
Sample Applications for Penetration Test Processes
-
Creating Command Line Scripts
-
Bash Environment
-
Environmental Variables
-
Piping Outputs
-
Piping
-
Redirect to a New File
-
Redirecting Content from a File
-
Text Search Operations and Manipulation
-
grep
-
awk
-
Shorts
-
Command and File Monitoring
-
watch
-
tail
-
Terminal Customization and Custom Terminals
-
tmux
-
alias
-
Bash Script Development
-
Bash Scripting Basics
-
Getting Input from User
-
if, else, elif
-
Logic Operators
-
Loops
-
Functions
Week 7
Local Network Penetration Tests
-
Basic Approach
-
Practical Pentest Tools
-
metasploit
-
SoftPerfect Network Scanner
-
Nmap
-
Zenmap
-
Medusa
-
hydra
-
Crowbar
-
Nessus
-
JohnTheRipper
-
Passive Information Gathering
-
Browser Protocol Analysis
-
Active Information Gathering
-
Port Scanning Techniques
-
Protocol Analysis
-
SMB Protocol Analysis
-
VNC Protocol Analysis
-
FTP Protocol Analysis
-
SMTP Protocol Analysis
-
HTTP Protocol Analysis
-
SSH Protocol Analysis
-
NFS Protocol Analysis
-
Vulnerability Scanning and Analysis
-
Vulnerability Scanning with Nmap
-
Vulnerability Scanning with Metasploit
-
Vulnerability Scan with Nikto
-
Vulnerability Scan with Nessus
Week 8
Wireless Network Penetration Tests
-
Terms
-
methodology
-
Practical WiFi Pentest Tools
-
Basic Communication
-
Important Wireless Network Packages
-
Configuration
-
Data collection
-
Information Gathering on Linux Systems
-
Information Collection on Windows Systems
-
Authorization Attacks
-
Hijacking WPA-PSK Supported Wireless Networks
-
Hijacking WPA2 (802.1x) Supported Wireless Networks
-
Blue Team Recommendations
Week 9
Web Application Penetration Tests
-
Web Application Technologies
-
URL Syntax
-
HTTP Protocol
-
HTTP Request and HTTP Response Structure
-
HTTP Methods
-
HTTP Header Information
-
Cookies
-
HTTP Status Codes
-
Practical Pentest Tools
-
Burp Suite
-
ZAProxy
-
wfuzz
-
dirbs
-
sqlmap
-
WPScan
-
Nikto
-
Firefox Add-ons
-
The Process of Analyzing a Web Application
-
Mapping Content and Functions
-
Analyzing the Application
-
Analyzing the Technologies Used by the Application
-
XSS Vulnerability Exploitation
-
Basics About Javascript
-
What is XSS Vulnerability?
-
How to Look for XSS Vulnerability?
-
XSS Vulnerability Exploitation
-
Exploiting SQL Injection Vulnerability
-
What is SQL Injection Vulnerability?
-
What Causes SQL Injection Vulnerability?
-
How to Look for SQL Injection Vulnerability?
-
Exploiting SQL Injection Vulnerability
-
Exploiting IDOR Vulnerability
-
What is IDOR?
-
What Causes IDOR Vulnerability?
-
How to Look for IDOR Vulnerability?
-
Exploiting IDOR Vulnerability?
-
LFI Vulnerability Exploitation
-
What is LFI?
-
What Causes LFI Vulnerability?
-
How to Look for LFI Vulnerability?
-
LFI Vulnerability Exploitation
-
File Upload Vulnerability Exploitation
-
What is File Upload Vulnerability?
-
What Causes File Upload Vulnerability?
-
How to Look for File Upload Vulnerability?
-
File Upload Vulnerability Exploitation
-
Apache Tomcat Manager
-
Detecting the Application
-
Accessing the Application
-
Analysis of Application Functions
-
Exploitation of the Application
-
WordPress Application Analysis
-
Detecting the Application
-
Analysis of Exploitation Points of the Application
-
Exploitation of the Application
Week 10
Mobile Application Penetration Tests
-
Android Application Components
-
Anatomy of an APK File
-
Practical Pentest Tools
-
Lab Setup
-
General Approach (Attack Surface Mapping)
-
Jailbreak Process – IOS Devices
-
Static Analysis
-
Static Analysis of Android Applications
-
Static Analysis of IOS Applications
-
Dynamic Analysis
-
Dynamic Analysis of Android Applications
-
Dynamic Analysis of iOS Applications
Week 11
Social Engineering Tests
-
What is Social Engineering?
-
Purpose of Social Engineering Tests
-
Practical Social Engineering Tools
-
Fishing Attack
-
Macro Development Techniques
-
Developing a Malicious HTA File
-
Social Engineering Scenarios
Week 12
Active Directory Penetration Tests
-
About Active Directory
-
Practical Penetration Testing Tools
-
Information Collection Methods
-
Gathering Information with Basic Commands
-
Information Gathering with PowerView
-
Information Gathering with PowerUpSql
-
Information Gathering with mmc.exe
-
Active Directory Active Attack Methods
Week 13
Elevation Attacks on Windows Systems
-
Collecting Information About the Operating System
-
Gathering Information About Applications
-
Gathering Information About Network Connections
-
Investigation of Sensitive Data
-
Registered Wireless Network Password Information
-
Dumping Password Information of Users in the System
-
Detecting Vulnerable Service Configurations
-
AllwaysInstallElevated
Week 14
Elevation Attacks on Linux Systems
-
Collecting Information About the Operating System
-
Gathering Information About Applications and Services
-
Detecting sensitive information
-
Gathering Information About Network Connections
-
Collecting Information About Users and Their Activities
-
Practical Applications
Week 15
Penetration Test Result Report Preparation
-
Relations with the Customer
-
Reporting
-
Report Draft
-
Header and Footer Design
-
Cover design
-
Document Tag
-
Address to the Institution
-
Table of Contents
-
Table List
-
Shapes List
-
Legal Responsibilities
-
Executive Summary
-
Finding Card Preparation
-
What to Include in the Report
-
Report Delivery Standard
-
Enforcement of the Four Eyes Rule
Week 16
Live Practice Applications
-
Penetration testing in a cloud-based lab environment
Student Ratings & Reviews
No Review Yet