Getting Started in Cyber Security for Students and Professionals

Emerging Tech

This course covers the different aspects of cyber security, professional hacking and methodologies. This training path concentrates more on hands-on-lab sessions of attack scenarios rather than focusing on only theoretical part.

₹5,998

(40% off) ₹12,000

To be scheduled based on demand. Sign up here if you are interested in this course.

Abhijith B R
Schedule: 2 hours per day for 15 days
30 hours of training | 12 hours of lab exam

7:00 PM to 9:00 PM

Level: Beginner/Intermediate

Medium : English and Malayalam

Reach us @(+91) 79942 11666

Cyber Security Training for Beginners.jp

What you'll learn

  • Cyber security methodologies

  • Application security assessment, penetration testing and vulnerability assessment

  • Cyber defense systems 

  • Online labs and CTF platforms

  • Performing application security assessment, Penetration testing and Vulnerability assessment.

  • Offensive and Defensive cyber security methodologies and Cyber defense systems.

  • Train with Dedicated online labs and CTF platform.

Who can learn

Anyone who is interested in cyber security and professional hacking, college students and professionals with a basic understanding of networks and operating systems

Industry relevance and need

Keeping a good cyber security posture is essential for organizations, and organizations are seeking security professionals (Security analysts, cyber defense analyst, penetration testers etc.) who are well trained. Almost every industry is starting their own security teams to secure their digital assets. This training session would give you a clear introduction to the information security industry.

Skills to be acquired

  • Good understanding of various topics in cyber security and methodologies

  • Practical knowledge in application security assessment, penetration testing, and a wide set of attack vectors along with cyber defense systems.

 

Prerequisite
 

A Windows or Linux desktop/laptop with decent configuration, a stable internet connection. It is better to have VMWare player or VirtualBox preinstalled.

 

Co-created by


Red Team Village

Curated by 

Bloombloom

Co-certified by

Red Team Village, Bloombloom

Course Delivered by

WhatsApp Image 2020-03-30 at 12.35.09 PM

Experienced Cyber Security Professional

Abhijith has nearly 10 years of experience in the Information and Cyber Security domain. Formerly the Deputy Manager - Cyber Security at Nissan Digital India, previously employed with EY as a Senior security analyst.

 

He is a professional Penetration tester, security researcher, trainer and public speaker; mostly researches in intelligent automation of penetration testing, red teaming, adversarial attack simulation tactics and real-life corporate infrastructure CTF scenarios.

 

Abhijith is the founder of Red Team Village, a red teaming community which actively organizes hacking villages and CTF competitions in security conferences, also acts as the Lead Organizer of DEF CON Group Trivandrum. He has spoken at various cyber security conferences such as BSides, c0c0n, OWASP seasides, Opensource India, Nullcon etc.

LinkedIn

Course Curriculum

Module 1
Systems and Networking Basics Networking, system administration, Operating systems, IP addressing, various protocols
Module 2
Introduction to Information/Cyber Security and professional hacking Intro and history of hacking, Information security and cyber security, terminologies, sub categories etc
Module 3
Section 1: Offensive Cyber security - Introduction, Methodologies Introduction to Offensive side of cyber security, terminologies, standards
Module 4
Vulnerability assessments Vulnerability assessment steps and procedures (Lab) Vulnerability management. Performing vulnerability assessments using nessus and OpenVas Creation of reports
Module 5
Introduction to Penetration testing Steps and procedures to perform penetration testing (Lab) Recon, port scanning, finding vulnerabilities, exploitation Creation of pentesting reports
Module 6
Penetration testing using Kali linux, Metasploit Performing attack and penetration testing against a target system using Kali linux and metasploit (Lab)
Module 7
Introduction to mobile application security assessments Security review of mobile applications (Android/IOS) (Lab)
Module 8
Application/web application security assessment (OWASP) Security review of web applications using OWASP (Lab) Top 10 vulnerability list Burp Suite ZED attack proxy Automated scanners Testing for XSS, SQL/LDAP/NoSQL/Command injection File inclusion CSRF Session hijacking SSL and other web related vulnerabilities
Module 9
Infrastructure security assessment/penetration testing Infrastructure and network pentesting (Lab) Attacking windows, Linux platforms, Networking devices, Database servers, Windows Active Directory, kerberos etc
Module 10
Password attacks - Password and hash cracking Building a password cracking rig (Lab) Hashes and password cracking using hashcat
Module 11
Social engineering, Phishing attacks and Malware Phishing and spear phishing campaigns (Lab) Reverse administration trojans Command and control Creating word/excel document based spear phishing campaigns using powershell Building malware
Module 12
Wireless networks security assessments Types of Wi-Fi networks (Lab) Protocols Wi-Fi networks security assessments Scanning and breaking passwords
Module 13
Physical security assessments and introduction to hardware Hacking Basics of overt and covert physical security testing Hardware hacking Creating hardware hacking gadgets and devices Demonstration of creating hardware gadgets using RaspBerry Pi, Lock picking etc
Module 14
Section 2: Defensive Cyber security - Introduction and Methodologies Defensive aspect of cyber security Different fields within Methodologies
Module 15
Cyber defense/SoC Functioning of Security operations centre Cyber Kill chain Forensics Incident response Security auditing and policies
Module 16
Monitoring and managing attacks using SoC Demonstration of activities done by a cyber defense analyst/SoC team (Lab) Elastic platform is being used for the lab environment in the cloud
Module 17
Introduction to Red teaming and attack simulation (A sneak peek of Advanced attack scenarios) Just a quick introduction of the advanced attack scenarios (Level 2) and Red teaming, Demonstration of exclusive red teaming tools.
Lab exam
Section III: Post training: Hands on Lab exam Description: All of these modules are focused on hands-on-labs and demonstrations. An online virtual lab platform would be available to the participants to perform the lab exercises from anywhere during the training period. Additional benefits: Access to online penetration testing labs and CTF platform