Internship in Cyber Security

Duration – 1 Month ( 4 Hours / Day )

Objectives

  • Secure both clean and corrupted systems, protecting personal data, securing simple computer networks, and safe Internet usage.
  • Understand key terms and concepts in cyber law, intellectual property and cybercrimes.
  • Understand principles of web security.
  • Incorporate approaches for incident analysis and response.

Pre-requisites

  • Good understanding of any programming is a must.
  • Knowledge of computer, Internet, Network, Linux OS.
  • SQL an added advantage.

Hardware and Software tools

  • Nikto, Wireshark, SQLMap, Hydra, John the Ripper, Metasploit, NMAP, hashcat.
  • Python, SQL, Kali Linux, Windows OS

Take away

  • Learning about Cyber security can be a rewarding and essential skill in today’s digital world, where threats to data, privacy, and online systems are becoming increasingly prevalent.
  • Various Components of a Computer System.
  • Understand how the computer components interact with an Operating System.
  • Getting familiar with Kali OS
  • Cyber security and ethical hacking fundamentals
  • Types of Hacking
  • Information gathering and foot printing
  • Computer Intrusions and Attacks (Unauthorized Access)
  • Computer Viruses, Time Bombs, Trojans, Malicious Code (Malware)
  • Online Fraud and Identity Theft; Intellectual Property Theft
  • Linux Commands
  • Introduction to Python
  • Control Statements
  • Lists, Tuples, Sets, Dictionaries
  • Computer Networks: LAN,WAN, MAN
  • ARPANET, NSFNET, Internet
  • nmap
  • Network Analysis using Wireshark,
  • Netsh command
  • Introduction to databases and RDBMS SQL and Types
  • Database creation, concept of relation and working
  • Creating tables. Design view of the table, Alter table operations
  • Constraints and working examples
  • Querying tables, Sorting and Filtering tables
  • SQL Clauses and Control flow functions
  • Indexes and Locks
  • Joins in SQL with working examples, Normalization & De-Normalization
  • Scalar functions in SQL
  • Stored Procedure and Functions
  • SQL Injection
  • Command Injection
  • Tracking mobile number using docker and cloud
  • Hash, Different Hash algorithms
  • Cracking the password using John the Ripper tool.
  • Brute Force Attacks
  • Cloning website and credential harvesting using social engineering tools
  • Gaining access to a machine using Metasploit framework
  • Analyzing OWASP Vulnerability
  • Scan web server using nikto
  • Reverse shell in python
  • Keylogger

Enquire Now

Enquire Now

Enquire Now

Please Sign Up to Download

Please Sign Up to Download

Enquire Now

Please Sign Up to Download

Enquiry Form