[go: up one dir, main page]

0% found this document useful (0 votes)
57 views37 pages

Cyber Security Course Syllabus

ThinkNEXT Technologies is a multinational company recognized with multiple national awards for excellence in web development, digital marketing, and industrial training. Their Cyber Security course covers a wide range of topics including networking concepts, ethical hacking, vulnerability assessment, and penetration testing. The company offers job assistance, flexible learning options, and a certificate of completion upon finishing the program.

Uploaded by

bebew44927
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views37 pages

Cyber Security Course Syllabus

ThinkNEXT Technologies is a multinational company recognized with multiple national awards for excellence in web development, digital marketing, and industrial training. Their Cyber Security course covers a wide range of topics including networking concepts, ethical hacking, vulnerability assessment, and penetration testing. The company offers job assistance, flexible learning options, and a certificate of completion upon finishing the program.

Uploaded by

bebew44927
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

ThinkNEXT Technologies

Private Limited
8 Times National Level
Award Winner Company
A Multinational Company (MNC)
CYBER
SECURITY

COURSE
ThinkNEXT bagged National Icon Award from
Bollywood Film Star Suniel Shetty for “Best Web
Development and Industrial Training Company”
ThinkNEXT bagged Asia’s Quality & Entrepreneurship
Award from Bollywood Film Actress Karisma Kapoor for
“Best Web Development and Industrial Training
Company”
ThinkNEXT Indian Iconic Award from Bollywood Actress
Amisha Patel for “Best Web Development and Digital
Marketing Company”
ThinkNEXT bagged National Gratitude Award from
Bollywood Actress Sonali Bendre for “Best Digital
Marketing and Industrial Training Company"
ThinkNEXT bagged Business Excellence Award at
Bengaluru for "Best Digital Marketing and Industrial
Training Company of the Year" from M. Satish Reddy
(Member of Karnataka Legislative Assembly)
ThinkNEXT bagged Iconic Business Summit
Award for "Most Trusted Digital Marketing and
Industrial Training Jaya Prada and Miss
Universe Romania Anca Verma
ThinkNEXT bagged Leadership Awards 2019 at Mumbai for
Best Digital Marketing and Industrial Training Company
from Surendra Pal, Indian Flim Actor and Politicians
Announcement for Nation’s Business Pride Award from
Shri Faggan Singh Kulaste (Union Minister of State for
Steel) for Best Digital Marketing and Industrial Training
Company
Cyber Security Course

Networking Concepts:--
• What is Computer Networking?
• How does Networking Work?
• Types of Networks
• What is IP Address?
• IPv4 vs Ipv6
• Types of IP Address
• Introduction to MAC Address?
• Role of Ports in Networking
• Introduction to Router and its elements
• What is OSI Model and How does It Work?
• What is TCP/IP Model and How does It Work?
• OSI vs TCP/IP Model
• What are Network Protocols?
• Types of Protocols
• How does TCP Work?
• TCP vs UDP
• What is Domain Name?
• What is DNS?
• DNS Records and Their Uses
• What is Zone File?
• What is DHCP ?
• What is DORA ?
• What is CIDR ?
• Capturing and Analyzing Network Packets (Wireshark)

Cyber Security:---(LAB Setup)


• Installing Kali Linux in Virtual Box
• Configuring Kali Linux
• Downloading a Good Wordlist
• Installing Burp Suite Pro
• Installing Acunetix Pro
• Scripts

Ethical Hacking
• What is Ethical Hacking?
• Types of Hackers
• Types of Attacks on a System
• Cybersecurity Laws
• What is Linux?
• Cool Features of Linux
• Basic File System of Linux
• Basic Linux Commands (Practical)
Footprinting and reconnaissance
• What are Footprinting and Reconnaissance?
• Types of Footprinting & Reconnaissance
• Use of Footprinting & Reconnaissance
• Footprinting Through Search Engines
• Footprinting using Advanced Google Hacking Techniques
• Footprinting Through Social Networking Sites
• Website Footprinting (Netcraft, Wappalyzer)
• Email Footprinting (Email tracker pro)
• DNS Footprinting (DNSenum, DNS Lookup, MX Lookup, NS Lookup)
• WHOIS Footprinting
• Footprinting Through OSINT Framework

Scanning networks (ping, nmap, Zenmap, messcan, armitage,hping3)


• What is Network Scanning?
• Network Scanning Methodology
• Types of Network Scans
• Checking for Live Systems and Buffer Size
• Checking for Open Ports
• Checking for Services On Ports
• Checking for Software with versions
• OS Fingerprinting & Banner Grabbing
• Countermeasures
• Saving xml report for Metasploit & Conversion

Enumeration
• What is Enumeration?
• Types of Enumeration
• Default Ports
• How to Enumerate NetBIOS?
• How to Enumerate SNMP?
• How to Enumerate SMTP?
• How to Enumerate NFS?
• How to Enumerate DNS?
• How to Enumerate all Services?
• Countermeasures

Vulnerability assessment:---
• What is Vulnerability Assessment?
• Classification of Vulnerability
• Vulnerability Assessment Lifecycle
• Vulnerability Assessment Solutions
• Vulnerability Scoring Systems
• Scanning for Vulnerability in Nmap scans result (MSF, Exploit DB, Armitage)
• Vulnerability Scanning - ZAP (OWASP)
System Hacking
• What is System Hacking?
• Where to exploit?
• How to exploit using Metasploit?
• Cracking Windows Password (Pwdump, Ophcrack, Lophcrack)
• Creating a Good Password list
• Escalate Privileges in Linux
• Escalate Privileges in Windows OS
• System Hacking using URL (Camera, Location, Passwords and more)
• URL Masking
• System Hacking using Open Ports (Nmap, NetCat, MSF, Armitage, Exploit DB)

Introduction to Penetration Testing


• What is penetration testing?
• Why is pentesting necessary?
• Phases of pentesting
• Penetration testing execution standard

Information Gathering
• Introduction to information gathering
• Types of information gathering
• What are we looking for?
• Footprinting using Burp Suite
Network Scanning
• Introduction to network scanning
• Types of scans in network scanning
• Rules for scanning a network
• What are we looking for?
• Network scanning using Metasploit
• Advanced scanning commands and scripts
Vulnerability Assessment
• Introduction to vulnerability assessment
• How to find the correct scope?
• How to find vulnerable parameters?

Parameter Temptation:--
• Introduction to parameter temptation
• Testing advanced parameter temptation

SQL injection:--
• Introduction to SQL injection
• Types of SQL injections
• SQLi methodology
• Testing for SQLi vulnerability
• Advanced SQLi Testing (SQLMAP)
Cross-Site Scripting (XSS)
• What is XSS?
• Types of XSS
• XSS methodology
• Hands-on XSS
• Innovative countermeasures
• Cross-Site Request Forgery (CSRF)
• Introduction of CSRF
• Host Header Injection
• Testing Hhi
• Advanced testing of CSRF attack

Sniffing and Spoofing


• What is Sniffing?
• How an Attacker Hacks the Network Using Sniffers?
• Active Scanning Techniques
• Types of Sniffing
• Protocols Vulnerable to Sniffing
• MAC Spoofing
• MAC Flooding
• DHCP Flooding
• Setup DHCP Rogue (MITM Attack)
• MITM Attack
• Sniffing with Wireshark

Session Hijacking
• What is Session Hijacking?
• Why is Session Hijacking Successful?
• Session Hijacking Process
• Types of Session Hijacking
Penetration Testing with Python
• Introduction to Python programming
• Use of Python
• Setting up lab
• Learning basic Python programming
• Creating Keylogger using Python
• Creating reverse Wi-Fi password-hacking Python program
Penetration Testing with Shell Scripting
• Introduction to shell scripting
• Use of shell scripting
• Setting up lab
• Learning basic shell scripting
• Writing cool scripts
Social engineering
• What is Social Engineering?
• Types of Social Engineering
• Human-based Social Engineering
• Computer-based Social Engineering
• Mobile-based Social Engineering
• Social Engineering Using SET
Dos & DDOS attacks
• What is DoS Attack?
• What is DDoS Attack?
• Basic Categories of DoS/DDoS Attack Vectors
• DoS in Networking (hping3, MSF, Yersiniya)
• DoS in Websites
• DoS using Programs and Commands (CPU and Memory Utilizations)

Hacking web Servers & Web apps


• What is Web Server? Web Server Attacks
• Web Server Attack Methodology
• Web Application Concepts
• Web Application Hacking Methodology
• Vulnerability Scanning (Acunetix Pro, Nessus)

Bug Reporting
• What is Web Server? Web Server Attacks
• Web Server Attack Methodology
• Web Application Concepts
• Web Application Hacking Methodology
• Vulnerability Scanning (Acunetix Pro, Nessus)

Hacking Wireless Networks


• What is Wireless Networking?
• Types of Wireless Encryption
• Types of Wireless Threats
• Wireless Hacking Methodology
Hacking Mobile Platform
• Mobile Platform Attack Vectors (Vulnerable Areas)
• OWASP Top-10 Mobile Risks- 2016
• Mobile Platform Vulnerability and Risks
• Mobile Security Guidelines
• Calls, SMS, Email Bombing on Android
• Generating Payloads (Basic to Advanced)
• Using Keylogger App
• Info Gathering from G-Accounts
• Android & IOS Security Scan (MVT, iMazing)
• Installing Termux in Android
• Installing Net Hunter Kali in Android

Android Penetration Testing (Practical)


• Introduction to Android pentesting?
• What is Android?
• What are Android applications?
• Introduction to AndroidManifest.xml
• Major components of an APK
• Methodology of APK pentesting
• Dalvik VM vs ART (Android Runtime)
• Setting Up Android Pentesting Lab
• Installing bytecode-viewer
• Installing MobSF
• APK server and adb setup
• Reverse engineering
• Information gathering
• Pentesting using MobSF
• Insecure password storage
• Hidden buttons
• Developers bug
• Insecure login
• Debug mode enabled
• Backup mode enabled
• Insecure login advanced
System Security using firwall, waf and antivirus
• All about firewalls
• GUI Windows Firewall configuration
• GUI Linux Firewall configuration
• WAF in Linux Config – MOD

Cryptography & Steganography


• What is Cryptography?
• Difference Between Encoding, Hashing & Cryptography
• Types of Cryptography
• How it works?
• Cryptography tools
• Hashing Tools
• Encoding Tools
• What is Steganography ?
• Types of Steganography
• Steganography Practical
• Diffrence between Cryptography

Malware Anaylysis
• What is Malware?
• Example of Malware
• What is Trojan?
• What are Viruses and Worms?
• Types of Malware Analysis
• Static Malware Analysis
• Dynamic Malware Analysis
• How to Create RAT Trojan? (HTTP, RAT)
• Creating Payloads (MSF)
• Creating Undetectable Payloads
• Ramsonware and its types
• Rootkit, Botnet (Zombie Computers), Spyware and Adware

Digital Forensics
• Data Recovery
• Data Backup & Rollback
• Encryption and Privacy, Data Integrity and Evolving Technology
• Csi Linux
• Computer Forensics
• Mobile Device Forensics
• Cloud Forensics
• Network Forensics
• Digital Forensics Investigation (Criminal, Corporate and Incident Response )
Being anonymous (DARK WEB )
• Understanding layers of Internet (Deep, Dark, Surface & Hidden Web)
• Changing User Agent (Random User Agent Switcher)
• Changing MAC Address (Macchanger)
• Auto Run Shell Script (MAC Changer)

Job assistance and career counselling


• Improve your Linkedin Profile
• How to create a good resume
• Demo Interview preparation
• How to select a domain in Cyber Security
• Sources to get good Knowledge
• Labs and Simulations
• Personal Projects
• Conferences and Meetups
• Consult a Career Counselor
• Certifications and Continuous Learning
• Research and Development
Awards & Achievements
Iconic Nation’s
Indian Business Business Business
Iconic Excellence Summit Pride
AWARD AWARD AWARD AWARD
WINNER 2024 WINNER 2023 WINNER 2021 WINNER 2021

Asia’s
National Business Quality &
Gratitude Leaders Entrepreneurship
AWARD AWARD AWARD
WINNER 2020 WINNER 2019 WINNER 2019

Microsoft
Ministry of Corporate Affairs blueprint Adwords
Government Of India
CIN No: U72200PB2011PTC035677 Facebook Certified Accredited Professional Google Partner

Content
Government of India
Marketing
Ministry of Skill Development
Member of Confederation & Entrepreneurship
Affiliated Certified
of Indian Industry Registration No: E09160300284

Content
Marketing Accredited Training Partner
Accredited Training Partner Affiliated
Certified
ISO Certified
Awards & Achievements

A meet with Bollywood actress Upasna


singh regarding Digital Marketing of her
upcoming movie

Award at Corporate Summit for Excellence


in Industrial Training
Award during Leadership

Munish Mittal Director, Receives Award from


IAS Ms. Apneet Riyait, Deputy Comissioner, Mansa
A meet with Chaudhary Udaybhan Singh
(Minister of State in Govt. of UP)

Chitkara University for Excellence in


Industrial Training
Award for Best Industrial Training Company

Award for Excellence in Industrial Training


Award for Excellence in Industrial Training

Award of Honour
WHY
CHOOSE US?

Get a Job Community Support

Be a Freelancer Expand Your Business


Who can apply our
Cyber Security course?

Let’s embark on this digital journey together.


Grab the spotlight by
getting certified!
Upon finishing our Cyber Security program,
you’ll earn a certificate of completion.
Call Now Book a Free

Demo Class

7837401000

@ThinkNEXTIndia www.thinknexttraining.com thinknexttechnologies


ThinkNEXT in Media
ThinkNEXT Technologies Pvt. Ltd.
ThinkNEXT in Media
ThinkNEXT Technologies Pvt. Ltd.
"TEACHERS OPEN THE DOORS,
BUT YOU MUST ENTER BY YOURSELF”

Training 100% 750+


on Live Practical Placement
Projects Training Partners

100% Flexible
Industry Job Learning
Expert Placement Options
Trainers

Affordable Lifetime Free Internship


Fees Placement also
Support available

10+ Globally
Live accepted
Projects certificate
Top Reasons to join
ThinkNEXT
ThinkNEXT Technologies Pvt. Ltd.
Cyber Security Training/Internship from 8 Times National Level Award Winner
Company
ThinkNEXT bagged Indian Iconic 2024 Award from Bollywood Actress Amisha Patel
for "Best Web Development and Digital Marketing Company” at New Delhi

ThinkNEXT bagged Business Excellence Award 2023 at Bengaluru for "Best Digital
Marketing and Industrial Training Company of the Year" from M. Satish Reddy
(Member of Karnataka Legislative Assembly)

ThinkNEXT bagged Iconic Business Summit Award 2021 for "Most Trusted Digital
Marketing and Industrial Training Company of the Year" from Bollywood Film
Actress & Politician Jaya Prada and Miss Universe Romania Anca Verma.

ThinkNEXT bagged Nation’s Business Pride Award 2021 from Shri Faggan Singh
Kulaste (Union Minister of State for Steel) for Best Digital Marketing and Industrial
Training Company

National Gratitude Award 2020 Winner for the Best Digital Marketing and Industrial
Training Company

Asia’s Quality & Entrepreneurship Award 2019 Winner for Best Web Development
and Industrial Training Company

Business Leaders Award 2019 Winner for Best Digital Marketing and Industrial
Training Company

National Icon Award 2018 Winner Company for Best Web Development and
Industrial Training Company

Apart from National Level Awards, ThinkNEXT also got many other awards/recognitions
in the field of software development, industrial training and digital marketing services.

Cyber Security Training/Internship from Government Registered Company with


Corporate Identity No. U72200PB2011PTCO35677. ThinkNEXT is registered as a
Pvt. Ltd. Company under the companies Act 1956 and approved by Ministry of
Corporate Affairs (MCA), Govt. of India

ThinkNEXT offers Part-Time/Full-Time Job offer during Cyber Security


training/internship so that students can earn while they learn.

Free Spoken English, Personality Development and Interview Preparation


(HR+Technical) Classes so that students need not to struggle for jobs as a fresher

Cyber Security Training/Internship from ISO 9001:2015 Certified, Google Partner,


Facebook Blueprint Certified, Microsoft Accredited and Hubspot Certified Company.

Authorized Pearson Testing Center for International Exams/Certifications.


R

www.thinknexttraining.com
Innovation at every step...
ISO 9001:2015 Certified Company
Top Reasons to join
ThinkNEXT
ThinkNEXT Technologies Pvt. Ltd.
Opportunity to get International Certifications from Microsoft, SAP, Apple, Adobe,
Autodesk, EC-Council, IC3, W3, Unity, QuickBooks etc.
ThinkNEXT has its own LMS, Certificate Portal, Job Portal and Mobile App for better
communication, access to study material and community support

Free online courses for class-room/offline students undergoing Cyber Security


Training/Internship

Get Cyber Security Training/Internship in 3 modes:


1. Classroom training/Offline training
2. Instructor-led online Live training
3. Self-Paced Online Courses

Lifetime membership to ThinkNEXT VIP Facebook Group for Placements and VIP
Telegram Group for Community Support

Guaranteed Job Interviews and 100% Placement Assistance

Online Certificate Verification Facility through QR Code. ThinkNEXT Certificates are


globally accepted and recognized.

Training on Live-Projects

Tally Authorized Training Partner Company with access to Tally Student Login, Tally
original licensed software, Tally original Study Material, and Tally Job Portal

Authorized Training Partner for Various Government Skill Development Projects


under NIELIT, NSDC, DoIT Punjab, PMKVY etc.

Affiliated to Indian Testing Board & ISTQB (International Software Testing


Qualifications Board)

Cyber Security Training/Internship from 12+ Years old company

Customized Syllabus (You can add your own relevant topics) and Backup Classes
(in case you miss some classes)

Free Subdomain and Web Hosting to host projects.

Numerous Tie-up with IT / Electronics / Mechanical / Civil / Electrical / Retail /


Textile etc. companies for Placements

Lifetime Validity Learning and Placement Assistance

Member of CII (Confederation of Indian Industry). Membership No. N5238P


R

www.thinknexttraining.com
Innovation at every step...
ISO 9001:2015 Certified Company
Curious Around how
the training goes
Attend a Free Demo Class
?
Offline Classroom and Online Live Classes
Regular Weekdays (9 am to 6 pm)
Early Morning Batches
Late Evening Batches
Weekend Batches
Daily 3 Hours : 2 Hours for Cyber Security
+ 1 Hour Spoken English, Personality
Development and Interview Preparation

Register for free Demo


Make yourself
Job Ready in
3-6 Months
Contact Us
S.C.F. 113, Sector-65
Mohali (Chandigarh)

7837401000

9577731000

www.thinknexttraining.com

thinknexttechnologies

thinknexttechnologies

@ThinkNEXTIndia

You might also like