CLICK TO CALL
Module 1: Introduction To Cyber Security
Hackers & Hacking Methodologies
Footprinting
Scanning
Enumeration
Escalation of privilege
Covering tracks
Types of hackers
Cyber Security threats
Computer security
Layer of security
Fundamental concepts of Security
Module 2: Information Gathering
Footprinting Threats
Methods of Footprinting
Using Search Engines
Financial Services and Information Gathering
Job Sites
Working with Email
Social Engineering
Module 3: Google Hacking
  Google Hacking Technique
  Google Advanced Search Operators
Module 4: Scanning
Types of Scans
NMAP Tool
OS Fingerprinting
Checking the Status of Ports
Banner Grabbing
Using Proxies
Enumeration
Module 5: System Hacking
Password-Cracking Techniques
Types of Password Attacks
Offline Attacks
Keylogger and AntiKeyloggers
Spyware and Antispyware
Steganography Techniques
Module 6: Encryption
What is Encryption, Data Encryption
Encryption Standards
DES, AES, RSA
md5, SHA-1, SHA-2
Digital Certificates
Working of Digital Certificates
Digital Signature
Cryptography Tools
Module 7: Data Backup And Recovery
Data Backup, Online Data backup
Types of backup
Raid 0, Raid 1, Raid 5
Data backup and restore
Data recovery
Module 8: Internet Security
Online Gaming Risks
Child Online Safety
SSL/TLS
Guidelines for Internet Security
Internet Security Laws
Module 9: Network Security and Email Security
Home Network
Create Wireless Network
Create an access point
Network Security Threats
Setting up a Wireless Network
Secure Network Connections
General Security Practices in Home Networking
Network firewall
IDSandIPS
VPN
Create inbound and outbound traffic policies
Email Security and Threats
Online Email Encryption Service
Identity Theft and Guidelines for identity theft Protection
Module 9: Mobile Security
Mobile Device Security
Mobile Malware and Anti-Virus