Value Addition Training (Engineering Students)
Introduction
Cybersecurity and Career Options
Security Basics
Introduction – Security Basics
Confidentiality
Integrity
Availability
Accountability
Non Repudiation
Exercises
Hackers Tools, Techniques and Exploits
Introduction – Hackers Tools and Techniques
Attack Methodology
Foot Printing – Labs
5 Topics
Passive Foot Printing
Kali Linux Setup on Windows 10
Kali Linux setup on Mac
Maltego Tool
Harvester Tool
Scanning
Foot Printing
Scanning – Labs
6 Topics
Demo Lab Setup
NMAP
Live System Scanning
Banner Grabbing
DNS Zone Transfer
Enumeration
Intrusion Evasion
Intrusion Evasion – Labs
4 Topics
Wireshark Installation
Wireshark on Windows 10
Telnet – ssh- ftp – sftp
Firewall – IDS – Evasion
Intrusion Detection
Intrusion Detection
2 Topics
Introduction
Intrusion Detection
Intrusion Detection – Labs
4 Topics
Detecting Intrusion
DNS Traffic Analysis
HTTP Traffic Analysis
RPC Traffic Analysis
Cyber Security Attacks and Counter Measures
Introduction
Public Cyber Security Attacks and Countermeasures
2 Topics
Public Cyber Security Attacks and Countermeasures
Exercise – Social Media Information Gathering – Facebook
1 of 2
Previous Lesson
Next Lesson
Introduction – Hackers Tools and Techniques
Value Addition Training (Engineering Students)
Introduction – Hackers Tools and Techniques
Previous Lesson
Back to Course
Next Lesson
Login
Accessing this course requires a login. Please enter your credentials below!
Username or Email Address
Password
Remember Me
Lost Your Password?