Course curriculum

  • 1

    Cyber/Network Security_E-Learning Content

    • Chapter - 1 Basic Network Security Components - 1

    • Basic Network Security Components - 2

    • Basic Network Security Components - 3

    • Introduction to Network Security

    • Network Security Goals

    • Security Mechanisms

    • Security Attacks

    • Chapter - 2 Cloud Computing Deployment Model

    • Cloud Computing - Taxonomy of Fear

    • Cloud Computing Security and Privacy Issues Identified By CSA - 1

    • Cloud Computing Security and Privacy Issues Identified By CSA - 2

    • Cloud Computing Security and Privacy Issues Identified By CSA - 3

    • Cloud Computing - Threat Model

    • Cloud Service Models_IaaS

    • Cloud Service Models_PaaS

    • Cloud Service Models_SaaS

    • Chapter - 3 Introduction to Block Chain Technology

    • Introduction to Cloud Computing

    • Privacy and Its Key Concerns - 1

    • Privacy and Its Key Concerns - 2

    • Security and Privacy Issues_Data Security

    • Security and Privacy Issues_Infrastructure Security

    • Block Chain Cyber Attacks and Security Tips

    • Introduction to Block Chain Technology

    • Introduction to IoT

    • IoT Security Threats and Security Challenges - 1

    • IoT Security Threats and Security Challenges - 2

    • Chapter - 4 Network Forensics - Introduction

    • Network Forensics - Analysis - 1

    • Network Forensics - Analysis - 2

    • Network Forensics - Case Study

    • Network Forensics - Detection 1

    • Network Forensics - Detection 2

    • Network Forensics - Host Based Sources for Analysis 1

    • Network Forensics - Host Based Sources for Analysis 2

    • Network Forensics - Logging & Monitoring

    • Network Forensics - Monitoring Policy

    • Network Forensics - Monitoring Targets

    • Network Forensics - Network Based Sources

    • Network Forensics - Network Sources for Evidence Collection

    • Network Forensics - NIDS_NIPS

    • Network Forensics - OSCAR Framework

    • Network Forensics - Threat Intelligence

    • Network Forensics - Timeline Analysis

    • Network Forensics-Types of Network Based Evidence

    • Chapter - 5 Introduction - SSL_TLS

    • Types of SSL_TLS Certificates

    • SSL_TLS Certificates

    • SSL_TLS - Basic Terminology

    • Introduction - SET

    • SET - Payment Process

    • Key Technologies of SET

    • TLS Handshake

    • Supported Transactions - Purchase Request

    • Introduction - Email Security

    • Email Security - SMIME

    • Email Security - PGp

    • Dual Signature Operation

    • Chapter - 6 X.509 Certificates - Introduction

    • X.509 Certificates - Hierarchy - Revocation

    • Various Digital Signatures

    • Key Distribution & Management - Introduction

    • Key Distribution & Management - Symmetric Key Distribution Using Public Keys

    • Key Distribution & Management - Public Keys Distribution

    • Key Distribution & Management - 4

    • Hash Functions - Introduction

    • Hash Functions - Cryptanalysis

    • Digital Signatures - Introduction

    • Attacks on Hash Functions

    • Asymmetric Key Cryptography

    • Chapter - 7 History - UNIX to Kali Linux

    • About Kali Linux - Tasks & Features

    • Installation - Kali Linux into Virtual Machine

    • Installation - Kali Linux on Hard Drive

    • Kali Linux - Managing Users & Groups

    • Kali Linux - Configuring Network

    • Kali Linux Fundamentals - 1

    • Kali Linux Fundamentals - 2

    • Kali Linux Fundamentals - 3

    • Kali Linux Fundamentals - 4

    • Kali Linux Fundamentals - 4_PART - 1

    • Kali Linux - Iptables

    • Kali Linux - Netfilter Firewall Framework

    • Kali Linux - Firewall Builder

    • Chapter - 8 Kali Linux - Logging & Monitoring

    • Kali Linux - Tools to Detect Changes

    • Chapter - 9 Introduction to Security Assessments

    • Formalization & Types of Attacks

    • Traditional Penetration Test & Application Assessment

    • Vulnerabilities & Exploits

    • Vulnerability Assessment - 1

    • Vulnerability Assessment - 2

  • 2

    Recordings of Live Classes

    • Cyber Security_Ethical Hacking 1st Live Session

    • Cyber Security_Ethical Hacking 2nd Live Session

    • Cyber Security_Ethical Hacking 3rd Live Session

    • Cyber Security_Ethical Hacking 4th Live Session

    • Cyber Security_Ethical Hacking 5th Live Session

    • Cyber Security_Ethical Hacking 6th Live Session

    • Cyber Security_Ethical Hacking 7th Live Session

    • Cyber Security_Ethical Hacking 8th Live Session

    • Cyber Security_Ethical Hacking 9th Live Session

    • Cyber Security_Ethical Hacking 10th Live Session

    • Cyber Security_Ethical Hacking 11th Live Session

    • Cyber Security_Ethical Hacking 12th Live Session

    • Cyber Security_Ethical Hacking 13th Live Session

    • Cyber Security_Ethical Hacking 14th Live Session

    • Cyber Security_Ethical Hacking 15th Live Session

    • Cyber Security_Ethical Hacking 16th Live Session

    • Cyber Security_Ethical Hacking 17th Live Session

  • 3

    Recordings of Project Live Classes

    • Execution of 1st Project

    • Execution of 2nd Project

    • Execution of 3rd Project

  • 4

    Project Submissions

    • Instructions for Submissions

  • 5

    Internship Project 1 - System Hacking from TALAKUNCHI NETWORKS

    • Project Challenges

    • Challenge 1 - Hydra

    • Challenge 2 - Auxiliary

    • Challenge 3 - NSE

    • Challenge 4 - John

    • Challenge 5 - Crunch

  • 6

    Internship Project 2 - Exploiting Server Vulnerabilities from TALAKUNCHI NETWORKS

    • Project Challenges

    • Challenge 1 - SMTP_open_relay

    • Challenge 2 - Zone_Transfers

    • Challenge 3 - Netbios

    • Challenge 4 - Sniffing

    • Challenge 5 - DoS

  • 7

    Recordings of Internship Project Live Classes

    • Execution of Internship Project 1 - System Hacking

    • Execution of Internship Project 2 - Exploiting Server Vulnerabilities

    • Instructions for Internship Project Submission