Getting Started in Cyber Security for Students and Professionals
This course covers the different aspects of cyber security, professional hacking and methodologies. This training path concentrates more on hands-on-lab sessions of attack scenarios rather than focusing on only theoretical part.
(40% off) ₹12,000
To be scheduled based on demand. Sign up here if you are interested in this course.
Abhijith B R
Schedule: 2 hours per day for 15 days
30 hours of training | 12 hours of lab exam
7:00 PM to 9:00 PM
Medium : English and Malayalam
Reach us @(+91) 79942 11666
What you'll learn
Cyber security methodologies
Application security assessment, penetration testing and vulnerability assessment
Cyber defense systems
Online labs and CTF platforms
Performing application security assessment, Penetration testing and Vulnerability assessment.
Offensive and Defensive cyber security methodologies and Cyber defense systems.
Train with Dedicated online labs and CTF platform.
Who can learn
Anyone who is interested in cyber security and professional hacking, college students and professionals with a basic understanding of networks and operating systems
Industry relevance and need
Keeping a good cyber security posture is essential for organizations, and organizations are seeking security professionals (Security analysts, cyber defense analyst, penetration testers etc.) who are well trained. Almost every industry is starting their own security teams to secure their digital assets. This training session would give you a clear introduction to the information security industry.
Skills to be acquired
Good understanding of various topics in cyber security and methodologies
Practical knowledge in application security assessment, penetration testing, and a wide set of attack vectors along with cyber defense systems.
A Windows or Linux desktop/laptop with decent configuration, a stable internet connection. It is better to have VMWare player or VirtualBox preinstalled.
Red Team Village
Red Team Village, Bloombloom
Course Delivered by
Experienced Cyber Security Professional
Abhijith has nearly 10 years of experience in the Information and Cyber Security domain. Formerly the Deputy Manager - Cyber Security at Nissan Digital India, previously employed with EY as a Senior security analyst.
He is a professional Penetration tester, security researcher, trainer and public speaker; mostly researches in intelligent automation of penetration testing, red teaming, adversarial attack simulation tactics and real-life corporate infrastructure CTF scenarios.
Abhijith is the founder of Red Team Village, a red teaming community which actively organizes hacking villages and CTF competitions in security conferences, also acts as the Lead Organizer of DEF CON Group Trivandrum. He has spoken at various cyber security conferences such as BSides, c0c0n, OWASP seasides, Opensource India, Nullcon etc.
Systems and Networking Basics Networking, system administration, Operating systems, IP addressing, various protocols
Introduction to Information/Cyber Security and professional hacking Intro and history of hacking, Information security and cyber security, terminologies, sub categories etc
Section 1: Offensive Cyber security - Introduction, Methodologies Introduction to Offensive side of cyber security, terminologies, standards
Vulnerability assessments Vulnerability assessment steps and procedures (Lab) Vulnerability management. Performing vulnerability assessments using nessus and OpenVas Creation of reports
Introduction to Penetration testing Steps and procedures to perform penetration testing (Lab) Recon, port scanning, finding vulnerabilities, exploitation Creation of pentesting reports
Penetration testing using Kali linux, Metasploit Performing attack and penetration testing against a target system using Kali linux and metasploit (Lab)
Introduction to mobile application security assessments Security review of mobile applications (Android/IOS) (Lab)
Application/web application security assessment (OWASP) Security review of web applications using OWASP (Lab) Top 10 vulnerability list Burp Suite ZED attack proxy Automated scanners Testing for XSS, SQL/LDAP/NoSQL/Command injection File inclusion CSRF Session hijacking SSL and other web related vulnerabilities
Infrastructure security assessment/penetration testing Infrastructure and network pentesting (Lab) Attacking windows, Linux platforms, Networking devices, Database servers, Windows Active Directory, kerberos etc
Password attacks - Password and hash cracking Building a password cracking rig (Lab) Hashes and password cracking using hashcat
Social engineering, Phishing attacks and Malware Phishing and spear phishing campaigns (Lab) Reverse administration trojans Command and control Creating word/excel document based spear phishing campaigns using powershell Building malware
Wireless networks security assessments Types of Wi-Fi networks (Lab) Protocols Wi-Fi networks security assessments Scanning and breaking passwords
Physical security assessments and introduction to hardware Hacking Basics of overt and covert physical security testing Hardware hacking Creating hardware hacking gadgets and devices Demonstration of creating hardware gadgets using RaspBerry Pi, Lock picking etc
Section 2: Defensive Cyber security - Introduction and Methodologies Defensive aspect of cyber security Different fields within Methodologies
Cyber defense/SoC Functioning of Security operations centre Cyber Kill chain Forensics Incident response Security auditing and policies
Monitoring and managing attacks using SoC Demonstration of activities done by a cyber defense analyst/SoC team (Lab) Elastic platform is being used for the lab environment in the cloud
Introduction to Red teaming and attack simulation (A sneak peek of Advanced attack scenarios) Just a quick introduction of the advanced attack scenarios (Level 2) and Red teaming, Demonstration of exclusive red teaming tools.
Section III: Post training: Hands on Lab exam Description: All of these modules are focused on hands-on-labs and demonstrations. An online virtual lab platform would be available to the participants to perform the lab exercises from anywhere during the training period. Additional benefits: Access to online penetration testing labs and CTF platform