Objectives
- Secure both clean and corrupted systems, protecting personal data, securing simple computer networks, and safe Internet usage.
- Understand key terms and concepts in cyber law, intellectual property and cybercrimes.
- Understand principles of web security.
- Incorporate approaches for incident analysis and response.
Pre-requisites
- Good understanding of any programming is a must.
- Knowledge of computer, Internet, Network, Linux OS.
- SQL an added advantage.
Hardware and Software tools
- Nikto, Wireshark, SQLMap, Hydra, John the Ripper, Metasploit, NMAP, hashcat.
- Python, SQL, Kali Linux, Windows OS
Take away
- Learning about Cyber security can be a rewarding and essential skill in today’s digital world, where threats to data, privacy, and online systems are becoming increasingly prevalent.
- Various Components of a Computer System.
- Understand how the computer components interact with an Operating System.
- Getting familiar with Kali OS
- Cyber security and ethical hacking fundamentals
- Types of Hacking
- Information gathering and foot printing
- Computer Intrusions and Attacks (Unauthorized Access)
- Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
- Online Fraud and Identity Theft; Intellectual Property Theft
- Linux Commands
- Introduction to Python
- Control Statements
- Lists, Tuples, Sets, Dictionaries
- Computer Networks: LAN,WAN, MAN
- ARPANET, NSFNET, Internet
- nmap
- Network Analysis using Wireshark,
- Netsh command
- Introduction to databases and RDBMS SQL and Types
- Database creation, concept of relation and working
- Creating tables. Design view of the table, Alter table operations
- Constraints and working examples
- Querying tables, Sorting and Filtering tables
- SQL Clauses and Control flow functions
- Indexes and Locks
- Joins in SQL with working examples, Normalization & De-Normalization
- Scalar functions in SQL
- Stored Procedure and Functions
- SQL Injection
- Command Injection
- Tracking mobile number using docker and cloud
- Hash, Different Hash algorithms
- Cracking the password using John the Ripper tool.
- Brute Force Attacks
- Cloning website and credential harvesting using social engineering tools
- Gaining access to a machine using Metasploit framework
- Analyzing OWASP Vulnerability
- Scan web server using nikto
- Reverse shell in python
- Keylogger