H | EHM (Ethical Hacking Mastery)
Students who want to learn advanced ethical hacking tactics and strategies can enroll in the Ethical Hacking Mastery course. To safeguard enterprises against cyberattacks, this in-depth course offers thorough instruction in finding weaknesses, safeguarding systems, and performing ethical hacking assessments.
Duration: 4 months
Module 1: Introduction To Cybersecurity and Security Program:
Topic 1: Key Elements of Cyber Security
Topic 2: CIA Triad (Confidentiality / Integrity / Availability)
Topic 3: Defense-In-Depth, Authentication, and Authorization.
Topic 4: Domain Landscape
Topic 5: AAA Services
Topic 6: Cybersecurity governance and strategy
Topic 7: Risk management (Rating methodologies)
Topic 8: Compliance (Legal / Regulatory / HIPAA / PCI – DSS)
Topic 9: Network Access Control
Module 2: Application and Web Application Security:
Topic 1: Core Concepts of Web Application
Topic 2: Information gathering with open-source tools
Topic 3: OSINT and Social Engineering
Topic 4: Network and Domain enumeration
Topic 5: SANS 25 and OWASP top 10
Topic 6: Vulnerability assessment
Topic 7: Anonymization on the Internet
Module 3: Threat Intelligence and VAPT:
Topic 1: What is a Security Testing and Its Type
Topic 2: Penetration Testing
Topic 3: Manual and Automated Scanning
Topic 4: Dealing with Vulnerabilities
Topic 5: Types of Security Vulnerability
Topic 6: Threat Sources & Events
Topic 7: Malwares and Its Type
Topic 8: Exploitable Vulnerability Reporting
Topic 9: Common Vulnerabilities and Exposures (CVE)
Topic 10: Using the Metasploit Framework
Topic 11: Exploitation
Topic 12: Privileges Escalation on Windows and Linux
Topic 13: Cloud Penetration Testing
Topic 14: Penetration testing concepts i.e. what why & how we do pen test?
Topic 15: Penetration testing methodology and Types
Module 4: Scripting For Security:
Topic 1: Client Server Model
Topic 2: Programming Fundamentals
Topic 3: Intro to Bash Scripting
Topic 4: Functions and classes in Python
Topic 5: API connections
Topic 6: Regular Expressions
Module 5: Security Operations Architecture and Detection:
Topic 1: Network Architecture Design
Topic 2: Virtual Private Cloud (VPC) design, configuration and deployment
Topic 3: Firewalls (Access Control Lists / Filters / Rules / White List / Black List)
Topic 4: Proxies, Remote Access, Virtual Private Network (VPN) configuration and deployment
Topic 5: Cloud Infrastructure Auditing
Topic 6: Security Information Event Management (SIEM)
Topic 7: Intrusion Detection System (IDS), Intrusion Prevention System (IPS)
Module 6: Cryptography:
Topic 1: Boolean Logic
Topic 2: Modulus Arithmetic, Symmetric / Asymmetric, Hashing
Topic 3: Hashing, TLS / SSL, Disk encryption
Topic 4: Key Derivation Functions
Topic 5: Digital Signatures, Key Management: Public Key Infrastructure
Topic 6: Password Cracking: Rainbow Tables
Module 7: AppSec & Offensive Security:
Topic 1: Assessment Approach Testing Viewpoints (Internal / External, Overt / Covert, White box / Gray Box / Black Box)
Topic 2: Vulnerability Scanning with Nmap and Nessus
Topic 3: Nikto and Burpsuite
Topic 4: Metasploit
Module 7: Threat Hunting & Incident Response:
Topic 1: CSIRT
Topic 2: NIST: IR Methodology (Preparation / Detection & Analysis / Containment, Eradication & Recovery / Post-Incident Activity)
Topic 3: NIST: Forensics Process (Data Collection / Examination / Analysis / Reporting)
Topic 4: Threat Intelligence (Cyber Kill Chain / Diamond Model)
Links
Contact Info
- +91 9920955055
- contact@hackanics.com
- Mumbai , Pune , Bangalore, Udaipur , Jaipur
Sign up for Newsletter
Hackanics copyright © 2024. All Rights Reserved.