H | AECC (Advanced Executive Course on Cybersecurity)
The Advanced Executive Course on Cybersecurity is tailored for senior executives, managers, and professionals seeking an in-depth understanding of cybersecurity challenges and strategies. The course emphasizes advanced concepts, strategic decision-making, and leadership in cybersecurity.
Advanced Executive Course on Cybersecurity
Category: Entry Level (1-year Exp)
Duration: 4 months
Module 1 – Security Essentials and Network Basics
Cybersecurity and CIA Triad
Malwares, Attacks, Threats, Vulnerabilities, Risk and Security Controls
Networking concepts
OSI models and TCP/IP Model
Ports and Secure protocols
Common network attacks and Network Devices
Module 2 – Network Security
Security Devices and Firewall
Unified threat management (UTM)
Web application firewalls and IDS
Network Access Control and SIEM
Secure Design, VLAN and VPN
DNS and DHCP
AAA
Authorization and Access control models
Active directory and LDAP
Module 3: Application and Web Application Security
Types of application and Web application components
Security policies, standards, procedures, guidelines, baselines
Vulnerability database (VDB) and Web Servers
OWASP top 10 and SANS 25
Fuzzing
Using components with known vulnerabilities
Symmetric cryptography and Asymmetric cryptography
Digital Signature and Digital Certificate
SAST , DAST Testing
Threat Modelling and SSDLC
OWASP Secure Coding Guide
API Security and Common API Vulnerabilities
Secure Configuration
Module 4: Malware and Ransomware Analysis
Introduction to Malware
Ransomware threat prevention and response
Secure Design Principles
Static and Dynamic analysis techniques
Malware Behaviors and Functionalities
Malware Obfuscation Techniques
Introduction to Ransomware
Advanced Malware Protection
Threat Intelligence and Malware Protection
The future of malware capabilities
Module 5: – Ethical Hacking and VAPT
What is a Security Testing and Vulnerability
Breach Attack Simulation
Manual and Automated Scanning
Types of Security Vulnerability
National Vulnerability Database
Managing Vulnerabilities in the Cloud
Exploitable Vulnerability Reporting
What is Vulnerability Management
Module 6: – Vulnerability Assessment
Vulnerability Assessment Program and Technology
Active and Passive Scanning Technology
The Standard for Vulnerability Severity Rating
Vulnerability database (VDB)
Common Vulnerabilities and Exposures (CVE)
Social Engineering
Mobile Hacking
Using the Metasploit Framework
Privileges Escalation and Maintaining Access
Cloud Penetration Testing
Module 7: – Penetration Testing
Penetration testing concepts i.e. what why & how we do pen test?
Penetration testing methodology
Types of penetration testing
Tools and techniques used in penetration testing
Information Discovery
Scanning & Enumerating Target
System Hacking
Infrastructure Hacking
Client-Side Hacking and Password Hacking
Web Application Hacking
Module 8: – Advanced Penetration Testing
Red Teaming Operations
Blue Teaming Operations
Purple Teaming
Breach Attack Simulation
Bug Bounty Program
Guidelines for Penetration Testers
Penetration Testing Report Writing
Links
Contact Info
- +91 9920955055
- contact@hackanics.com
- Mumbai , Pune , Bangalore, Udaipur , Jaipur
Sign up for Newsletter
Hackanics copyright © 2024. All Rights Reserved.