Skip to content
logo logo
  • Home
  • About Us
  • Courses
  • Gallery
  • Blog
  • Services
  • Contact Us
Whatsapp

H |…

  • Home
  • Course
  • H | Advanced Executive Course on Cybersecurity (H | AECC)

H | AECC (Advanced Executive Course on Cybersecurity)

The Advanced Executive Course on Cybersecurity is tailored for senior executives, managers, and professionals seeking an in-depth understanding of cybersecurity challenges and strategies. The course emphasizes advanced concepts, strategic decision-making, and leadership in cybersecurity.

Advanced Executive Course on Cybersecurity
 
Category: Entry Level (1-year Exp)
 
Duration: 4 months                                          
 
Module 1 – Security Essentials and Network Basics
    1. Cybersecurity and CIA Triad

    2. Malwares, Attacks, Threats, Vulnerabilities, Risk and Security Controls

    3. Networking concepts

    4. OSI models and TCP/IP Model

    5. Ports and Secure protocols

    6. Common network attacks and Network Devices

Module 2 – Network Security
    1. Security Devices and Firewall

    2. Unified threat management (UTM)

    3. Web application firewalls and IDS

    4. Network Access Control and SIEM

    5. Secure Design, VLAN and VPN

    6. DNS and DHCP

    7. AAA

    8. Authorization and Access control models

    9. Active directory and LDAP        

Module 3: Application and Web Application Security
    1. Types of application and Web application components

    2. Security policies, standards, procedures, guidelines, baselines

    3. Vulnerability database (VDB) and Web Servers

    4. OWASP top 10 and SANS 25

    5. Fuzzing

    6. Using components with known vulnerabilities

    7. Symmetric cryptography and Asymmetric cryptography

    8. Digital Signature and Digital Certificate

    9. SAST , DAST Testing

    10. Threat Modelling and SSDLC

    11. OWASP Secure Coding Guide

    12. API Security and Common API Vulnerabilities

    13. Secure Configuration

Module 4: Malware and Ransomware Analysis
  1. Introduction to Malware

  2. Ransomware threat prevention and response

  3. Secure Design Principles

  4. Static and Dynamic analysis techniques

  5. Malware Behaviors and Functionalities

  6. Malware Obfuscation Techniques

  7. Introduction to Ransomware

  8. Advanced Malware Protection

  9. Threat Intelligence and Malware Protection

  10. The future of malware capabilities

 

Module 5: – Ethical Hacking and VAPT

    1. What is a Security Testing and Vulnerability

    2. Breach Attack Simulation

    3. Manual and Automated Scanning

    4. Types of Security Vulnerability

    5. National Vulnerability Database

    6. Managing Vulnerabilities in the Cloud

    7. Exploitable Vulnerability Reporting

    8. What is Vulnerability Management

Module 6: – Vulnerability Assessment
    1. Vulnerability Assessment Program and Technology

    2. Active and Passive Scanning Technology

    3. The Standard for Vulnerability Severity Rating

    4. Vulnerability database (VDB)

    5. Common Vulnerabilities and Exposures (CVE)

    6. Social Engineering

    7. Mobile Hacking

    8. Using the Metasploit Framework

    9. Privileges Escalation and Maintaining Access

    10. Cloud Penetration Testing

Module 7: – Penetration Testing
    1. Penetration testing concepts i.e. what why & how we do pen test?

    2. Penetration testing methodology

    3. Types of penetration testing

    4. Tools and techniques used in penetration testing

    5. Information Discovery

    6. Scanning & Enumerating Target

    7. System Hacking

    8. Infrastructure Hacking

    9. Client-Side Hacking and Password Hacking

    10. Web Application Hacking

Module 8: – Advanced Penetration Testing
    1. Red Teaming Operations

    2. Blue Teaming Operations

    3. Purple Teaming

    4. Breach Attack Simulation

    5. Bug Bounty Program

    6. Guidelines for Penetration Testers

    7. Penetration Testing Report Writing

“Hackanics provides industry-leading certifications, courses, and professional expertise to help you achieve the tech career you deserve.”

Links

  • About us
  • Services
  • Courses
  • Blog
  • Contact us

Contact Info

  • +91 9920955055
  • contact@hackanics.com
  • Mumbai , Pune , Bangalore, Udaipur , Jaipur

Sign up for Newsletter

X-twitter Linkedin Instagram Youtube Facebook

Hackanics copyright © 2024. All Rights Reserved.

Copyright © Whizcyber 2024. All rights reserved