Uploaded by Tirth Patel

CO Course 2022-23

advertisement
Advanced Diploma in Ethical Hacking
and Cyber Security
Semester 1
(Introduction to Hacker’s World)
1.1) Hacker’s Interest Area
 What is Hacking
 What is Ethical Hacking
 Need of Hacking
 Scope of Ethical Hacking
 Types of Hacking
 Effects of Hacking
 Essential Terminologies
 Who is a Hacker
 Classes of Hackers
 Phases of Hacking
 Hackers World
 Current News and Concepts of Hacking World
1.2) TCP/IP Fundamentals
 Networking Introduction
 OSI Model
 TCP/IP Working
1
CYBER OCTET PRIVATE LIMITED
 Router & Switches
1.3) System Fundamentals
 Introduction with Operating System
 Basics and Advanced Level System based knowledge
 Hardware & Software
 Installation & Configuration
1.4) Basics of Linux
 Introduction to Linux
 History of Linux
 Why Linux
 Installation & Configuration
 Basic and Advanced Commands
 Tools of Hacking for Linux
1.5) Desktop & Server Security
 OS Security
 Manual Security configurations
 Tools used for Desktop Security
 Server Security Tools
 Basics attacks for Desktop and Server
1.6) 100% Anonymity – Being Anonymous on Internet
 Introduction with Proxies
 Proxy Servers
 Different Methods used for being Anonymous
 Proxies Websites
2
CYBER OCTET PRIVATE LIMITED
 Manual Configuration
 VPN
 SSH Putty
1.7) Internet Security
 Stay Secure Online
 Different Tools used for Internet Security
 Manual Methods of Security while surfing
 Antivirus and Add-ons of Security
1.8) Scanning, Fingerprinting, and Information Gathering
 Scanning Introduction
 Port Scanning
 Different Tools used for port Scanning
 Network Scanning
 Different Tools used for Network Scanning
 Sniffers
 Fingerprinting
 Information Gathering using Tools
 Information Gathering via Internet
 Malicious Information Gathering
 Different Methods of Information Gathering and Foot printing
1.9) Technical Attacks & Password Cracking
 What are Technical Attacks
 Internal Attacks
 External Attacks
3
CYBER OCTET PRIVATE LIMITED
 Different Scanning and Network Based attacks
 Different Password Attacks
 Tools for Password Cracking
 OS Based Password Attacks
1.10) Virus, Worms and Trojans
 What are Virus
 Different Virus
 Impact and Properties of Virus
 What are Worms
 Different Worms
 Impact and Properties of Worms
 What are Trojans
 Different Trojans
 Impact and Properties of Trojans
 Creation of Trojan
 What are Spyware and Adware
 Removal of Virus, Worms and Trojans
 Security for Virus, Worms and Trojans
1.11) Malware Analysis
 What are Malwares
 Different Malwares
 Facts of Malwares
 Malware Analysis
 Static & Dynamic Analysis
4
CYBER OCTET PRIVATE LIMITED
 Tools used for Analysis
1.12) Botnets and DDos
 What are Bots
 What are Botnets
 How to Develop a Bot
 Real World Case Study of Bots and Botnets
 What is DDOS
 DDOS Attack
 How to Prevent DDOS Attack
 Tools used for DDOS Attack
1.13) Reverse Engineering
 Introduction to Reverse Engineering
 Assembly Language
 Tools used for Reverse Engineering
 Demo
1.14) Mobile Hacking & Security/BYOD
 Introduction to Mobile Phones and Smart Phones
 GSM and Mobile Networking Technologies
 Smart Phones Operating System
 Different Attacks on Mobile Phone
 Bluetooth Hacking
 Protocols Vulnerable in Mobile Telephony
 Hacking Smart Phones with Smart Attacks
 Mobile Phone Security
5
CYBER OCTET PRIVATE LIMITED
1.15) Hacking the Bio-Metric Systems
 Introduction to Bio-Metric Systems
 Understanding to Bio-Metric Systems
 Internal Testing
 External Testing
1.16) Cryptography, steganography
 Introduction with Cryptography
 Encryption
 Decryption
 DES
 AES
 Various Others Methods of Encryption
 Tools for Cryptography
 Introduction with steganography
 Steganography Tools
1.17) Google Hacking
 Use of Google for Malicious Information Gathering
 Use of Google to Hack
 Google Hacking Tools
 Google Hacking Database
1.18) Active directory server
 How to configure server in virtual machine
 How to configure DNS
 How to configure DHCP
6
CYBER OCTET PRIVATE LIMITED
 How to configure ADDS
 How to create OU and Child OU
 Create users and group
 Configuration of users and group
 Create and configure policy
 Network sharing
 NTFS network sharing
 Network drive mapping
1.19) EPS and DLP
 Configuration
 Monitoring
 Configuration of rules and policy
1.20) Server hardening
 User configuration
 Network configuration
 Features and roles configuration
 Update installation
 NTP configuration
 Firewall configuration
 Remove access configuration
 Service configuration
 Further hardening
 Logging and monitoring
 Frequently asked questions
7
CYBER OCTET PRIVATE LIMITED
1.21) Operating system based Virtualization
 What is Operating System Virtualization?
 Uses of Operating System Virtualization
 How Operating System Virtualization Works?
 Types of OS Virtualization
 Types of Disks in OS Virtualization
1.22) The rise of ransomware
 Introduction
 Understand Ransomware Entry Points and Your Vulnerabilities
 Know the Preventive Steps to Take
 Build Your Incident-Response Plan
 Next-Generation Protection for a New Reality
 Ransomware before 2016
 The pivot to targeted attacks: 2016-2021
 2021 The professionalization of ransomware
1.24) Basics of IT
 Introduction of Computer
 Data and Network Communication
 Computer System & I/O Devices
 An Introduction to Database Management System
 Data Modelling using the Entity Relationship Model
 Introduction to Microprocessors and Microcomputers
 The Architecture of a Microprocessor
8
CYBER OCTET PRIVATE LIMITED
 Introduction to Cloud Computing
 Cloud Security
 Cloud Computing Security Architecture
1.25) Server architecture
9
CYBER OCTET PRIVATE LIMITED
Semester 2
(Professional Ethical Hacking)
2.1) Social Engineering
 What is Social Engineering
 Types of Social Engineering
 Different Laws mention for Social Engineering
 Techniques used for Social Engineering
 Tools used for Social Engineering
 Case Study of Social Engineering
2.2) Honeypot and Honeynets
 What are Honeypots and Honeynets
 Types of Honeypots
 How to Develop Honeypot
 Deploying Honeypot
 Real world Honeypots
2.3) Firewall, IDS & IPS
 Introduction with Firewall
 Types of Firewalls
 Firewall Configuration
 Firewall Planning and Designing
 Introduction with IDS
 Types of IDS
 IDS Configuration
10
CYBER OCTET PRIVATE LIMITED
 Introduction of IPS
 Types of IPS
 IPS Configuration
2.4) Network Scanning & vulnerabilities
 Scanning Network
 Types of Network Scan
 Tools used for Network Scanning
 Searching for network-based Vulnerabilities
 Hacking Network
 Network Security
 Different Security Policies for Network Security
2.5) WIFI Hacking and Security
 Introduction with WIFI
 Different Standards for Wireless Network
 Hacking WIFI
 Different Tools used for WIFI Hacking
 WIFI Configuration
 WIFI Security
2.6) Browser Security
 Browser Configurations and Services
 Browser based Hacking
 Browser Security
 Add-ons and Tools used
 BEEF (Browser Exploitation Framework)
11
CYBER OCTET PRIVATE LIMITED
2.7) Application Security Architecture
 Multi Tired Systems
 Risk Approach
 Mitigating Risk
 Different Architecture Designed
2.8) Programming
 Pop vs oop
 SDLC
 SDLC phases
 Database and ER diagram
 Different SDLC models
 Programming language
 Interpreter vs compiler
 Programming grammar
 Array
 Stack
 Queue
 Linked list
2.9) JavaScript and Ajax Security
 Introduction to Java and Ajax
 Attacking Java and Ajax
 Security for JavaScript and Ajax
2.10) Database Security
 Introduction
12
CYBER OCTET PRIVATE LIMITED
 Common Database Vulnerabilities
 Privileges
 Database Communication Protocol Vulnerabilities
 Weak Authentication and Password Attacks
 Backup Data Exposure
 Monitoring Methods
 Policies
 Keys and Management
 Certificates
2.11) Secure Coding & Practices
 Introduction
 Authentication
 Session Management
 Access Control
 Input Validation
 Output Encoding
 Secure Transmission
 File Uploads
2.12) Web Application Security
 Information Gathering
 Configuration Management
 Security Transmission
 Authentication
 Session Management
13
CYBER OCTET PRIVATE LIMITED
 Authorization
 Data Validation
 Cryptology
 Risk Functionality
 HTML5
 Error Handling & Logging
2.13) Business logical vulnerability
 Email spoofing
 Demo
 How to Prevent email spoofing
 Union base injection
 Demo
 How to Prevent union base injection
 Boolean base injection
 Demo
 How to Prevent Boolean base injection
 Text base injection
 Demo
 How to Prevent text base injection
 Html injection
 Demo
 How to Prevent html injection
 Session hijacking
 Demo
14
CYBER OCTET PRIVATE LIMITED
 How to Prevent session hijacking
 Invalidate redirection
 Demo
 How to Prevent invalidate redirection
 Click jacking
 Demo
 How to Prevent click jacking
 File Uploads
 Demo
 How to Prevent file upload
 Cross site scripting (xss)
 Demo
 How to Prevent cross site scripting (xss)
2.14) OWASP (Top Ten Vulnerabilities)
 What is OWASP
 What are Vulnerabilities
 Broken Access Control
 Demo
 How to Prevent Broken Access Control
 Cryptographic Failures
 Demo
 How to Prevent Cryptographic Failures
 Injection
 Demo
15
CYBER OCTET PRIVATE LIMITED
 How to Prevent Injection
 Insecure Design
 Demo
 How to prevent Insecure Design
 Security Misconfiguration
 Demo
 How to prevent Security Misconfiguration
 Vulnerable and Outdated Components
 Demo
 How to prevent Vulnerable and Outdated Components
 Identification and Authentication Failures
 Demo
 How to prevent Identification and Authentication Failures
 Software and Data Integrity Failures
 Demo
 How to Prevent Software and Data Integrity Failures
 Security Logging and Monitoring Failures
 Demo
 How to Prevent Security Logging and Monitoring Failures
 Server-Side Request Forgery
 Demo
 How to Prevent Server-Side Request Forgery
2.15) OWASP Testing Framework
 Different Phases
16
CYBER OCTET PRIVATE LIMITED
 Web Application Penetration Testing
 Types of Testing
 Methodology
 Information Gathering
 Business Logic testing
 Authentication Testing
 Session Management testing
 Data Validation Testing
 Denial of Service Testing
 Web Service Testing
 Ajax Testing
 Testing Report
 What to Fix
 Writing the Report
2.16) SANS 25 Vulnerabilities in Web applications
 What is SANS
 SANS Top 25 Dangerous Programming Errors
 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
 Improper Neutralization of Special Elements used in an OS Command ('OS Command
Injection')
 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
 Improper Neutralization of Input During Web Page Generation ('Cross-site
 Scripting
 Missing Authentication for Critical Function
17
CYBER OCTET PRIVATE LIMITED
 Missing Authorization
 Use of Hard-coded Credentials
 Missing Encryption of Sensitive Data
 Unrestricted Upload of File with Dangerous Type
 Reliance on Untrusted Inputs in a Security Decision
 Execution with Unnecessary Privileges
 Cross-Site Request Forgery (CSRF)
 Improper Limitation of a Pathname to a Restricted Directory ('Path
 Understanding Vulnerability Assessment
 Vulnerability Scanning
 Server Assessment
 Security Configuration
 Website Assessment
 Vulnerability Research and Verification
 Understanding Penetration Testing
 Application Security Testing and Code Review
 OS Fingerprinting
 Service Fingerprinting
 Access Control Mapping
 Denial of Service (DoS)
 Distributed DoS
 Authorization Testing
 Lockout Testing
 Password Cracking
18
CYBER OCTET PRIVATE LIMITED
 Cookie Security
 Functionality Testing (Input validation of login fields, Transaction Testing etc.)
 Difference Between Vulnerability Assessment and Penetration Testing
2.17) VA/PT Frameworks
 Scope
 Detail about Target
 Approach
 Techniques
 Acquisition and Information gathering
 Risk analysis
 Traversal
 Download of Code Without Integrity Check
 Incorrect Authorization
 Inclusion of Functionality from Untrusted Control Sphere
 Incorrect Permission Assignment for Critical Resource
 Use of Potentially Dangerous Function
 Use of a Broken or Risky Cryptographic Algorithm
 Incorrect Calculation of Buffer Size
 Improper Restriction of Excessive Authentication Attempts
 URL Redirection to Untrusted Site ('Open Redirect')
 Uncontrolled Format String
 Integer Overflow or Wraparound
 Use of a One-Way Hash without a Salt
2.18) OWASP Top Ten Mobile Application Vulnerabilities
19
CYBER OCTET PRIVATE LIMITED
 Improper Platform Usage
 Insecure Data Storage
 Insecure Communication
 Insecure Authentication
 Insufficient Cryptography
 Insecure Authorization
 Client Code Quality
 Code Tampering
 Reverse Engineering
 Extraneous Functionality
2.19) OWASP Top Ten IOT Vulnerabilities
 Weak, Guessable, or Hardcoded Passwords
 Insecure Network Services
 Insecure Ecosystem Interfaces
 Lack of Secure Update Mechanisms
 Use of Insecure or Outdated Components
 Insufficient Privacy Protection
 Insecure Data Transfer and Storage
 Lack of Device Management
 Insecure Default Settings
 Lack of Physical Hardening
2.20) OWASP Top Ten API Vulnerabilities
 Broken Object Level Authorization
 Broken User Authentication
20
CYBER OCTET PRIVATE LIMITED
 Excessive Data Exposure
 Lack of Resources & Rate Limiting
 Broken Function Level Authorization
 Mass Assignment
 Security Misconfiguration
 Injection
 Improper Assets Management
 Insufficient Logging & Monitoring
2.21) Vulnerability Assessment and Penetration Testing (VA/PT)
 Social Engineering
 Vulnerability Assessment
 Penetration Testing
 Post Testing
 Reporting
2.22) VA/PT Tools
 Acunetix Web Vulnerability Scanner
 Netsparker
 Burp-Suite
 Nessus
 w3af
2.23) VA/PT Report and Documentation Writing
 Executive Summary
 Core Findings with Risk Analysis
 Detailed Findings/Checklist
21
CYBER OCTET PRIVATE LIMITED
 Vulnerability Description
 Vulnerability Mitigation
2.24) Kali Linux (Hackers Operating System)
 Introduction with Kali Linux Operating System
 Tools used in Kali Linux
 Reconnaissance (3 Tools)
 Scanning (3 Tools)
 Enumeration (3 Tools)
 Vulnerability Scanners (3 Tools)
 Password Crackers (3 Tools)
 Exploitation (3 Tools)
 Bluetooth (2 Tools)
 Forensics (2 Tools)
 Intrusion Detection (2 Tools)
 Wireless (2 Tools)
2.25) AWS Security, Identity, & Compliance services
 Identity & access management
 Detection
 Network and application protection
 Data protection
 Incident response
 Compliance
 2.26) Metasploit
 2.27) DevSecOps
22
CYBER OCTET PRIVATE LIMITED
Semester 3
(Professional Forensics Expert)
3.1) Hacking Incidents
 Introduction with Hacking Attacks
 Recent Case Studies
 Famous Case Studies
3.2) Incident Handling
 Crime Scene
 Seizing Incident Scene
 Guidelines
 How and what to
3.3) Cyber Forensics & Mobile Forensics
 Introduction with Forensics
 Security Threats and Vulnerabilities
 ACPO Guidelines
 Different File Systems
 Forensics Process and Approach
 Mobile Phone Forensics
 Tools used for Cyber Forensics
 Tools used for Mobile Forensics
3.4) Basic Steps In Forensics Analysis
 Understanding Evidence
 Preparation
23
CYBER OCTET PRIVATE LIMITED
 Imaging
 Collection
 Examination
 Analysis
 Reporting
3.5) Data Recovery and Documents Analysis
 Introduction to Data Recovery
 Tools used to Data Recovery
 Digital Analysis
 Documents Analysis
3.6) Understanding Anti-Forensics
 What are Anti-Forensics
 Tools used for Anti-Forensics
 Techniques used for Anti-Forensics
 Detecting Anti-Forensics
3.7) Forensics Documentation
 Preparing Case
 Checklist
 Questioning
3.8) Cyber Crime Investigation
 What is Cyber Crime
 Who are Cyber Criminals
 Types of Cyber Crimes
 Investigation
24
CYBER OCTET PRIVATE LIMITED
 Reverse Investigation
 From Incident to Court of Order
3.9) Case Studies
 Bomb Blast
 Phishing
 Source Code Theft
 Credit Card
 Domain Theft
 Website Hacking
 Fake Profile case
 Pornography case
 Many Famous Cases
3.10) U.S. Federal Laws
3.11) Cyber Law (IT ACT)
 Introduction with Information Technology Act 2000
 Indian Cyber laws
 Computer Software Copyright Act
 Pornography Act
 IPC and IT ACT
 Real world Case Studies
 IT Act Amendment
25
CYBER OCTET PRIVATE LIMITED
Semester 4
(Professional IT Security Manager & Auditor)
4.1) Information Security Management
 Introduction to Information Security Management
 Process - PDCA
 Do's and Don'ts
 Guidelines
 Terms & Definitions
4.2) ISO 27001 Implementation & Audit
 Information Security
 CIA Model
 Information Security Policy
 Assets Classification
 Organization
 HR Security
 Physical & Environmental
 Access Control
 Software Development
 Incident Management
 Business Continuity
 RART
 Compliance
4.3) PCI/DSS
26
CYBER OCTET PRIVATE LIMITED
 Introduction to PCI/DSS
 Protect Card Holder Data
 Maintain Vulnerability Program
 Access Control
 Regulations
 Maintain
 Compliance
 Process Flow
4.4) COBIT
 Introduction to COBIT
 COBIT Framework
 Understanding COBIT
 Scope
 Internal Control
 COSO
 Planning & organization
 Acquisition and Implementation
 Delivery & Support
 Monitoring
4.5) Security Integration in Software Development Lifecycle
 Facts & Figures
 How to do it
 Application Risk Security Categorisation
 Application Security Project Plan
27
CYBER OCTET PRIVATE LIMITED
 Application Security Requirement
 Design Reviews
 Analysis
 Testing
4.6) Operational Securities & Functional Security
 Introduction to OPSEC
 Identification in OPSEC
 Analysis of Threats in OPSEC
 Analysis of Vulnerabilities in OPSEC
 Assessment of Risk in OPSEC
 OPSEC Measures
 What is Functional Security
 Model based approach for Functional Security
4.7) Business Logic Attacks
 Introduction to Business Logic Attacks
 Types of Business Logic Attacks
 Mitigating BATS
4.8) Threat Modelling
 What is Threat
 High Level Process
 Diagram Software Structure
 Identifying Assets
 Identifying Threat Agents
 Enumerate Doomsday Attacks
28
CYBER OCTET PRIVATE LIMITED
 Documents Misuse
 Review
4.9) Risk Assessment, Business Continuity and Disaster
 What is Risk Management
 Who uses Risk Management
 How is it used
 Risk Management process
 What is Disaster
 what is Business Continuity
 Standards for BCP & DRP
 Business Impact Assessment
 Emergency Response
4.10) Security Architecture and Designs
 Different Security Architecture
 Criteria
 Certification & Accreditation
 Computer Components
 Software
 Software Security Threats and Countermeasures
4.11) Data Leakage Protection Tools
4.12) Security Management Practices and Framework
4.13) Demonstration on Internal Audits
4.14) GDPR
4.15) AI & Machine Learning
29
CYBER OCTET PRIVATE LIMITED
4.16) Block Chain
4.17) Python
4.18) Database Introduction
4.19) OOPS Concept
4.20) Project Management
4.21) Information Technology Service Management
4.22) Threat Hunting
4.23) Industrial Control Systems & Operations Systems
4.24) Data Science
4.25) Data Analytics
4.26) Cyber Threat Management
4.27) Cyber Warfare Management
4.28) Cloud Security (Cloudflare, AWS & Azure)
30
CYBER OCTET PRIVATE LIMITED
Semester 5
(A Corporate Level Efficiency Training for the Candidates)
 Presentation Skills
 Public Speaking
 Corporate Email Drafting
 Email Etiquette
 Power Dressing
 Interview Preparation
 Negotiation Skills
 Marketing & Sales Training
 Time Management
Internship + Project
Hands on Live Project/Cases, Training by Experienced and renowned Trainers, Research
Paper Publication in Magazines.
Exams: Exams would be conducted on regular basis & on the Basis of the Project Submitted and
the course covered in above semesters. Practical & Theoretical both Exams would be
compulsory for the candidates. 60% would be passing Marks.
Eligibility & Prerequisite: 10th & 12th Pass Student with
Computers/Diploma/Degree Students are eligible to register for this course.
31
Basics
of
CYBER OCTET PRIVATE LIMITED
Download