CYBER SECURITY(CEH,CHFI) OUTLINE

Course Content/Lesson Plan

Course Title: Cyber Security(CEH,CHFI)

Duration:3 Months

Trainer Name
Course Title Cyber Security(CEH,CHFI)
Week 1 Introduction to Cyber Security
Day 1 Cyber Security Fundamentals: Introduction to Cybersecurity - concepts and history, the need for it.
Day 2 Threats and Vulnerabilities: The properties of threats and vulnerabilities of different kinds and how they are used to attack systems.
Day 3 Cyber Security Terminology: Key Terms and Jargon in Cyber Security.
Day 4 Security Policies and Procedures: Basics in the writing and implementation of security policies.
Day 5 Lab: Basic Network Security Hands-on Lab for Understanding Basic Technical Knowledge of the Network Security Principles.
Week 2 Ethical Hacking Basics (CEH)
Day 6 Overview of Ethical Hacking: This paper gives a general outlook on the principles and approaches used in ethical hacking.
Day 7 Reconnaissance Techniques: Learning footprinting and reconnaissance techniques
Day 8 Scanning Networks: Network scanning techniques and tools
Day 9 Enumeration: Techniques for enumerating information about systems and networks.
Day 10 Lab: Reconnaissance and Scanning This set of practical exercises on reconnaissance and scanning.
Week 3 System Hacking (CEH)
Day 11 System Hacking Overview: Introduction to concepts and methodologies related to system hacking
Day 12 Password hacking: methods and instruments used in the cracking of passwords.
Day 13 Malware Threats:Various malware types and their damages.
Day 14 Sniffing : Various techniques for capturing and analyzing network traffic.
Day 15 System Hacking Techniques lab:: Hands-on Lab on System Hacking and Sniffing.
Week 4 Web Application Security (CEH)
Day 16 Web Application Vulnerabilities: This section provides common web application vulnerabilities.
Day 17 SQL injection: comprehend SQL injection assault and lessening methodologies.
Day 18 Cross-Site Scripting:Detection of XSS and mitigation technique.
Day 19 Session Hijacking: Methods of Session Hijacking and Preventive Measures.td>
Day 20 Hands-on Lab: Testing Web Application Security.
Week 5 Wireless Network Security (CEH)
Day 21 Wireless Network Basics: Concepts of wireless networks and security concerns.
Day 22 Wireless Encryption: Understanding the various encryption protocols used to secure wireless transmission along with their vulnerabilities.
Day 23 Wireless Attacks: In the overview of the various attacks against wireless networks, we will tell you about those quite common.
Day 24 Wireless Network Security: Best practices for securing wireless networks
Day 25 Wireless Network Security Laboratory Work: This is a practical exercise that will aid learners in learning exactly how wireless networks can be secured or attacked.
Week 6 Cryptography
Day 26 Introduction to Cryptography: Understanding cryptographic principles and algorithms.
Day 27 Symmetric vs. Asymmetric: Be able to differentiate symmetric and asymmetric encryption and also applications of each.
Day 28 Hashing : Hashing Details of hashing algorithms and how they are applied.
Day 29 Digital Signatures: Digital signature and its significance in security.
Day 30 Cryptography Techniques : Cryptography techniques hands-on lab for implementation and understanding.
Week 7 Introduction to Computer Hacking Forensics, CHF
Day 31 Forensics Fundamentals: Overview of the principles of computer forensics and processes.
Day 32 Digital Evidence: Types of digital evidence and its value.
Day 33 Incident Response: Incident response and management steps.
Day 34 Forensic Tools :Overview of computer forensic tools.
Day 35 Digital Forensics : Exercises on collection and analysis of digital evidence.
Week 8 Forensic Investigation Process (CHIF)
Day 36 Investigation Process: Steps in a forensic investigation process.
Day 37 Acquisition: Data acquisition techniques from digital devices.
Day 38 Data Analysis: Methods for the analysis of acquired data.
Day 39 Report Writing: Best practices when reporting forensic findings.
Day 40 Forensic Investigation Lab: Hands-on lab on how to conduct a forensic investigation.
Week 9 Network Forensics (CHIF)
Day 41 Introduction to Network Forensics: Introduction on the basics of network forensics and why it is a major concern.
Day 42 Network Traffic Analysis:Capturing and analyzing network traffic techniques.
Day 43 Intrusion Detection:Intrusion detection techniques and methods along with intrusion detection systems.
Day 44 Malware Analysis: Methods for analyzing malware captured in network traffic. .
Day 45 Lab: Network Forensics: Practical exercises on network traffic analysis and intrusion detection.
Week 10 Mobile Forensics (CHIF)
Day 46 Introduction to Mobile Forensics : Fundamentals of Mobile Forensic and Its Associated Challenges.td>
Day 47 Mobile Device Data Acquisition :Techniques used during the acquisition of data from a mobile device.
Day 48 Mobile Data Analysis: Methods used for the analysis of data obtained from a mobile device.
Day 49 Mobile Forensic Tools: Overview of Used Tools in Mobile Forensics.
Day 50 Mobile Forensics Lab: Hands-on lab in the acquisition and analysis of mobile device data.
Week 11 Cloud Forensics (CHIF)
Day 51 Introduction to Cloud Forensics: Basically, cloud forensics and why it is important.
Day 52 Cloud Computing Fundamentals: Concepts of cloud computing.
Day 53 Data Acquisition in Cloud : Methods of data acquisition from cloud environments.
Day 54 Cloud Data Analysis: Techniques to analyze data extracted from cloud environments. .
Day 55 Cloud Forensics Lab: Hands-on activities on cloud data extraction and analysis.
Week 12 Final Project and Review
Day 56 FINAL Project Planning: Setting up and structuring the final project that will put into practice all the concepts learnt.
Day 57 Project Development: Development of the final project. Both concepts CEH and CHIF are going to be useful here
Day 58 Project Development:Further development on the final project, emphasis on testing and debugging.
Day 59 Project Finalization: Finalization of the project, checking all is in order as per requirements.
Day 60 Presentation and Evaluation: Final presentation of the project, giving and receiving feedback, assessing against set criteria.

Reffrences Links

https://youtu.be/inWWhr5tnEA?si=BQtcxB7Ak6QtRHqX

https://youtu.be/rz0RL4Xue-A?si=Cj6iWJ8JXuS4JK9s

https://youtu.be/vJTGfxn2U6Y?si=4649EWBMb4FxLVlz