| Trainer Name |
|---|
| Course Title | Cyber Security(CEH,CHFI) |
|---|---|
| Week 1 | Introduction to Cyber Security |
| Day 1 | Cyber Security Fundamentals: Introduction to Cybersecurity - concepts and history, the need for it. |
| Day 2 | Threats and Vulnerabilities: The properties of threats and vulnerabilities of different kinds and how they are used to attack systems. |
| Day 3 | Cyber Security Terminology: Key Terms and Jargon in Cyber Security. |
| Day 4 | Security Policies and Procedures: Basics in the writing and implementation of security policies. |
| Day 5 | Lab: Basic Network Security Hands-on Lab for Understanding Basic Technical Knowledge of the Network Security Principles. |
| Week 2 | Ethical Hacking Basics (CEH) |
| Day 6 | Overview of Ethical Hacking: This paper gives a general outlook on the principles and approaches used in ethical hacking. |
| Day 7 | Reconnaissance Techniques: Learning footprinting and reconnaissance techniques |
| Day 8 | Scanning Networks: Network scanning techniques and tools |
| Day 9 | Enumeration: Techniques for enumerating information about systems and networks. |
| Day 10 | Lab: Reconnaissance and Scanning This set of practical exercises on reconnaissance and scanning. |
| Week 3 | System Hacking (CEH) |
| Day 11 | System Hacking Overview: Introduction to concepts and methodologies related to system hacking |
| Day 12 | Password hacking: methods and instruments used in the cracking of passwords. |
| Day 13 | Malware Threats:Various malware types and their damages. |
| Day 14 | Sniffing : Various techniques for capturing and analyzing network traffic. |
| Day 15 | System Hacking Techniques lab:: Hands-on Lab on System Hacking and Sniffing. |
| Week 4 | Web Application Security (CEH) |
| Day 16 | Web Application Vulnerabilities: This section provides common web application vulnerabilities. |
| Day 17 | SQL injection: comprehend SQL injection assault and lessening methodologies. |
| Day 18 | Cross-Site Scripting:Detection of XSS and mitigation technique. |
| Day 19 | Session Hijacking: Methods of Session Hijacking and Preventive Measures.td> |
| Day 20 | Hands-on Lab: Testing Web Application Security. |
| Week 5 | Wireless Network Security (CEH) |
| Day 21 | Wireless Network Basics: Concepts of wireless networks and security concerns. |
| Day 22 | Wireless Encryption: Understanding the various encryption protocols used to secure wireless transmission along with their vulnerabilities. |
| Day 23 | Wireless Attacks: In the overview of the various attacks against wireless networks, we will tell you about those quite common. |
| Day 24 | Wireless Network Security: Best practices for securing wireless networks |
| Day 25 | Wireless Network Security Laboratory Work: This is a practical exercise that will aid learners in learning exactly how wireless networks can be secured or attacked. |
| Week 6 | Cryptography |
| Day 26 | Introduction to Cryptography: Understanding cryptographic principles and algorithms. |
| Day 27 | Symmetric vs. Asymmetric: Be able to differentiate symmetric and asymmetric encryption and also applications of each. |
| Day 28 | Hashing : Hashing Details of hashing algorithms and how they are applied. |
| Day 29 | Digital Signatures: Digital signature and its significance in security. |
| Day 30 | Cryptography Techniques : Cryptography techniques hands-on lab for implementation and understanding. |
| Week 7 | Introduction to Computer Hacking Forensics, CHF |
| Day 31 | Forensics Fundamentals: Overview of the principles of computer forensics and processes. |
| Day 32 | Digital Evidence: Types of digital evidence and its value. |
| Day 33 | Incident Response: Incident response and management steps. |
| Day 34 | Forensic Tools :Overview of computer forensic tools. |
| Day 35 | Digital Forensics : Exercises on collection and analysis of digital evidence. |
| Week 8 | Forensic Investigation Process (CHIF) |
| Day 36 | Investigation Process: Steps in a forensic investigation process. |
| Day 37 | Acquisition: Data acquisition techniques from digital devices. |
| Day 38 | Data Analysis: Methods for the analysis of acquired data. |
| Day 39 | Report Writing: Best practices when reporting forensic findings. |
| Day 40 | Forensic Investigation Lab: Hands-on lab on how to conduct a forensic investigation. |
| Week 9 | Network Forensics (CHIF) |
| Day 41 | Introduction to Network Forensics: Introduction on the basics of network forensics and why it is a major concern. |
| Day 42 | Network Traffic Analysis:Capturing and analyzing network traffic techniques. |
| Day 43 | Intrusion Detection:Intrusion detection techniques and methods along with intrusion detection systems. |
| Day 44 | Malware Analysis: Methods for analyzing malware captured in network traffic. . |
| Day 45 | Lab: Network Forensics: Practical exercises on network traffic analysis and intrusion detection. |
| Week 10 | Mobile Forensics (CHIF) |
| Day 46 | Introduction to Mobile Forensics : Fundamentals of Mobile Forensic and Its Associated Challenges.td> |
| Day 47 | Mobile Device Data Acquisition :Techniques used during the acquisition of data from a mobile device. |
| Day 48 | Mobile Data Analysis: Methods used for the analysis of data obtained from a mobile device. |
| Day 49 | Mobile Forensic Tools: Overview of Used Tools in Mobile Forensics. |
| Day 50 | Mobile Forensics Lab: Hands-on lab in the acquisition and analysis of mobile device data. |
| Week 11 | Cloud Forensics (CHIF) |
| Day 51 | Introduction to Cloud Forensics: Basically, cloud forensics and why it is important. |
| Day 52 | Cloud Computing Fundamentals: Concepts of cloud computing. |
| Day 53 | Data Acquisition in Cloud : Methods of data acquisition from cloud environments. |
| Day 54 | Cloud Data Analysis: Techniques to analyze data extracted from cloud environments. . |
| Day 55 | Cloud Forensics Lab: Hands-on activities on cloud data extraction and analysis. |
| Week 12 | Final Project and Review |
| Day 56 | FINAL Project Planning: Setting up and structuring the final project that will put into practice all the concepts learnt. |
| Day 57 | Project Development: Development of the final project. Both concepts CEH and CHIF are going to be useful here |
| Day 58 | Project Development:Further development on the final project, emphasis on testing and debugging. |
| Day 59 | Project Finalization: Finalization of the project, checking all is in order as per requirements. |
| Day 60 | Presentation and Evaluation: Final presentation of the project, giving and receiving feedback, assessing against set criteria. |
https://youtu.be/inWWhr5tnEA?si=BQtcxB7Ak6QtRHqX
https://youtu.be/rz0RL4Xue-A?si=Cj6iWJ8JXuS4JK9s
https://youtu.be/vJTGfxn2U6Y?si=4649EWBMb4FxLVlz