Certified Cyber Security Professional™ Instructor-Led Training

MODULES INCLUDED

  • What is Cybersecurity
  • Elements of Cybersecurity
  • Common Threats
  • Cybersecurity & ISO
  • ISO 27001
  • Introduction to Cryptography
  • Types of Cryptography
  • Advantages of using Cryptography
  • Cryptographic Algorithm Types
    • Hashing
    • Symmetric Algorithm
    • Asymmetric Algorithm
  • Cryptographic Attacks
  • Operations Security
    • Introduction to Operations Security
    • Process involved in Operations Security
  • Overview of Data Security
  • Fundamentals of Cloud Security
  • Fundamentals of Network Security
    • Information Security
    • Elements of Information Security
    • Need for Network Security
    • Network Types & Topologies
    • Enterprise Networks
    • Routing & Switching of Packets
    • Open System Interconnectivity Model
  • Brief about Threat Mitigation
    • What is a Firewall?
    • How does Firewall work?
    • Router Security
    • Features of Wireless Security
    • Steps to Secure a Router
    • Port Security – Switches
    • What is a Proxy Server?
    • What are the functions of Proxy Servers?
    • What are the types of Proxy Servers?
    • What is Reverse Proxy Servers?
    • Applications of Reverse Proxy Servers?
  • Fundamental of Network Protocols
    • What is Network Protocol?
    • What are the different types of protocols?
  • Brief about Network Address Translations
    • What is Network Address Translations?
    • What are the types of Network Address Translations?
    • What are the advantages & disadvantages of Network Address Translations?
  • Overview of Transmission Control Protocol
    • What is Transmission Control Protocol?
    • What are the types of Transmission Control Protocol?
    • Architecture of Transmission Control Protocol
    • Transmission Control Protocol: Three-way handshake overview
    • Three-way handshake workability
  • Use-case study
    • Nessus – device vulnerability assessment on GUI
    • WebScarab – intercept request, respond and modification
    • Wireshark
  • What is Endpoint protection?
  • Defining endpoint protection at the workplace and home
  • Features of Endpoint Security Protection
  • Explaining pillars of Endpoint protection
  • What is Endpoint Encryption?
  • Disk Encryption & Removable Media Encryption
  • Challenges of Endpoint Security
  • Endpoint Security Solutions
  • Endpoint Security Tools
  • Introduction to OWASP
  • Vulnerabilites of OWASP
  • Top 10 OWASP – 2013 Vs 2017
  • Ten Most Critical Web Application Security Risks – Year 2017
  • Use Case Study:
    • WebGoat Test Lab on OWASP Top 10
      • Lab Specifications
      • Exercises based on OWASP
  • Software Development Overview
    • What is Software Development
    • Introduction to Software Development Lifecycle
    • Fundamentals of Software Development Models
  • Brief About Web Application
    • Web Application Overview
    • Web Application Flow
    • HTTP Protocols
    • HTTP Architecture
    • Web Architecture of Applications
    • Non-web based Application
  • Fundamentals of Application Security
    • Application Security Overview
    • Process of Software Development Lifecycle
    • Need for Application Security
    • Web Application Design Issues
    • Attack Vector and Application Threat
    • Common Vulnerability and Scoring System
    • Application Attack Vectors
    • How Application is attacked?
    • Source Code Analysis
    • Types of Source Code Analysis
    • Vulnerabilities
    • Client Side Vulnerability
    • Server-side Vulnerabilities
  • Use-case study: Scanning for Application Scanning
    • Introduction to Acunetix
      • Lab Specifications
      • Exercise 1: Install Acunetix on the system
      • Exercise 2: Add target to start scanning a web application
      • Exercise 3: Start scanning a web application using Acunetix
      • Exercise 4: Generate scan report from Acunetix
    • Introduction to NMap
      • Lab Specifications
      • Exercise 1: Install NMap on Wndows/Mac/Ubantu
      • Exercise 2: Performing Port Scans
      • Exercise 3: Performing Host Scans
    • Introduction to Nessus
      • Lab Specifications
      • Exercise 1: Install Nessus vulnerability scanner tools
      • Exercise 2: Start scanning web applications using Nessus
  • What is Social Engineering?
  • Brief about Social Engineering Lifecycle
  • What are Social Engineering techniques?
  • Social Engineering Preventions
  • Vulnerability Assessment
  • Penetration Testing
  • Basics of VAPT
  • Benefits of VAPT
  • Why are systems vulnerable?
  • Steps involved in VAPT process
  • Network VAPT process
  • Web VAPT process
  • VAPT Tools
  • Use-case study: How to exploit vulnerability using Metasploit
  • Overview of Kali Linux
  • Brief about tools of Kali Linux
  • Use-case study:
    • VMWare –
      • Lab Specifications
      • Exercise 1: Install VMWare on the system
      • Exercise 2: Add target to start scanning a web application
      • Exercise 3: Start scanning a web application using Acunetix
      • Exercise 4: Generate scan report from Acunetix
    • Kali Linux
      • Lab Specifications
      • Exercise 1: Install Kali Linux
      • Exercise 2: VMWare
    • NMap –
      • Lab specifications
      • Exercise 1: To find an exploit
      • Exercise 2: How to set up the Hack Lab
      • Exercise 3: How to grab a screenshot of target system
      • Exercise 4: Metasploit Payload operation, meterpreter
      • EExercise: How to compromise windows virtual machine
    • BurpSuite –
      • Lab specifications
      • Install and run BurpSuite
  • Authentication and Authorization issues
  • What is Deleaker?
  • Web Application Firewall Overview
  • Types of Web Application Firewall
  • Features of Web Application Firewall
  • What are the common attacks prevented using web application firewall
  • Web Application Security
  • Networking
  • Authentication & Authorization
  • Logging, Monitoring, and Reporting
  • Application Delivery and Acceleration
  • XML Firewall
  • DDoS Protection
  • Brief about ModSecurity
  • There will be an online training followed by a multiple choice exam of 100 marks.
  • You need to acquire 60+ marks to clear the exam.
  • If you fail, you can retake the exam after one day.
  • You can take the exam no more than 3 times.
  • If you fail to acquire 60+ marks even after three attempts, then you need to contact us to get assistance for clearing the exam

Certification Benefits

  • Getting trained by industry experts.
  • Comprehensive learning of cybersecurity& its implementation.
  • Hands-on working exposure in the cybersecurity domain.
  • Showcase your knowledge of cybersecurity expert.
  • Implement your skills to any cybersecurity project.
  • Gain a competitive advantage in interviews

What you get?

  • Global Tech Council Certification
  • Lifetime validity
  • Peer-to-Peer networking opportunity

CAREER FACTS

Top job functions

  • Information Security Analyst
  • Software Developers
  • Database Administrators
  • IT Security Engineers
  • Others

What does Cyber Security Professionals do?
Cyber Security Professional protects information on computer networks, cloud servers, mobile devices, and payment software.

The Growth Curve ahead:

Information Security Analyst
Security Architect
IT Security Engineer
Security Systems Administrator
IT Security Consultant
Chief Information Security Officer.
Security Consultant
Security Expert
Security Architect

Domains Cyber Security Professionals work in:
IT, Retail, eCommerce, banks, insurance, and other domains.

Final Outcome

Earning this certification entitles individuals to work successfully as a cybersecurity professional with excellent career prospects ahead.

Success Stories

Global Tech Council | globaltechcouncil.org