Cyber Security Certification Training Course



featured project

Cyber Security Certification Training Course

Cyber Security Certification training by Certpine will help learn Cyber security concepts from scratch. Throughout the online Cyber security training, you will learn important concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses along with hands-on demonstrations. Join this Cyber security Certification course and get certified as a Cyber security expert.

Weekend (Sat-Sun) Weekdays (Mon-Fri)
$289 $289

CURRICULUM

Learning Objective: In this Cyber security training online module, you will learn about the essential building blocks and basic concepts around cyber security such as Confidentiality, Integrity, Availability, Security Architecture, Security Policies, and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture.  

Topics:
  • Need of Cybersecurity
  • CIA Triad
  • Security Architecture
  • Security Governance
  • Security Auditing
  • Regulations & Frameworks
  • Ethical Hacking
  • Types of Hackers
  • Phases of Ethical Hacking
  • Penetration Testing
  • Types of Penetration Testing
  • Footprinting
  • Objectives of Footprinting
  • Types of Footprinting
  • Footprinting Techniques

Hands-On/Demo:
  • Footprinting a website using Whois Lookup, netcraft, and shodan
  • Gathering information about Domain through Reon-ng Tool in Kali Linux
  • Gathering information about Domain through Maltego Tool
  • Gathering information about Sub-domain through Sublist3r and dnsmap tool in Kali linux
  • Email Footprinting using eMail Tracker Pro
  • DNS Footprinting using DNS Interrogation Tools

Learning Objective: In this cyber security courses online module, you will learn various forms of cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods, and its usage are employed in the enterprise to store and transmit messages safely.

Topics:
  • Types of cryptography
  • Symmetric cryptography
  • Asymmetric cryptography
  • Hash functions
  • Digital signatures
  • Public Key Infrastructure (PKI)
  • Attacks on cryptosystems

Hands-On/Demo:
  • Generating and identifying hashes
  • Signing a file with digital signatures

Learning Objective: In this cyber security learning module, you will glance over various aspects related to computer networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks.


Topics:
  • Introduction to Computer Network
  • Computer Networks - Architecture 
  • Layered architecture
  • Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP) 
  • Network Scanning
  • Enumeration
  • Common Network Threats/Attacks

Hands-On/Demo:
  • Identify the Network Routes in the System
  • DNS lookup and reverse lookup
  • Network Path tracing
  • Network Analysis 
  • Network scanning 
  • Enumeration

Learning Objective: We offer the best cyber security courses online so that you can learn the importance of Application-level security. You will also explore various known application weaknesses, techniques to attack them, and various controls/solutions to these vulnerabilities. You will also get an overview of countermeasures that can be employed to protect from different threats.


Topics:
  • Web server architecture
  • Web server attacks
  • Countermeasures and patch management
  • Web application architecture
  • Web application attacks

Hands-On/Demo:
  • Capturing session ID with Burp Suite
  • Local File Inclusion on bWAPP

Learning Objective: In Certpine's best cyber security certification course module, you will learn about the aspects related to the principle of Identity & Access Management. This module covers various intricacies around concepts of authorization, authentication, identity & access management, and its benefits to an enterprise.

Topics:
  • Authentication and authorization
  • Authentication and authorization principles
  • Regulation of access
  • Access administration
  • IdAM
  • Password protection 
  • Identity theft

Hands-On/Demo:
  • Adding and granting permissions to users in Linux
  • Identifying phishing websites

Learning Objective: In this cyber security certification course module you will learn how to analyze a system for various vulnerabilities. You will also learn various strategies and methodologies to gain access to the system.

Topics:
The following topics you will be having in this cybersecurity course module:

  • Vulnerability Analysis
  • Types of Vulnerability Analysis
  • Vulnerability Assessment Lifecycle
  • Vulnerability Assessment Tools
  • Vulnerability Scoring Systems
  • Vulnerability Assessments Report
  • System Hacking
  • Password Cracking
  • Privilege escalation
  • Executing Applications
  • Hiding Files
  • Clearing Logs
Hands-On/Demo:
  • Find the vulnerabilities of the host/website using the Nessus tool
  • Find the vulnerabilites on target website/ host using Nikto scanner
  • Password Breaking – Ophcrack
  • Password Breaking  - Konboot Tool
  • Install keyloggers and configure the victim PC to monitor the system on keystrokes and screenshots

Learning Objective: In Certpine's best cyber security courses online module, you will learn the concept of malwares, its propagation techniques, its types, concept of sniffing, types of sniffing attacks, SQL injection & its types, and SQL injection methodologies.


Topics:
  • Malware and its propagation ways
  • Malware components
  • Types of malware
  • Concept of sniffing
  • Types of sniffing
  • Types of sniffing attacks
  • SQL injection
  • Types of SQL injection
  • SQL injection Methodologies
Hands-On/Demo:
  • Create a trojan by using msfvenom
  • Sniff network packets Using Wireshark
  • MAC Flooding Using macof
  • DHCP attack using Yersinia
  • Bypass Authentication using SQL Injection
  • Determine how the hackers may get the database of a website and steal the credentials of users from website vulnerability

Learning Objective:  In this cyber security training online module, you will gain an overview of DoS and DDoS attacks, session hijacking and its types, working of the intrusion detection system, and the concept of honeypots. 

Topics:
  • DoS attack
  • DDoS attack
  • Common symptoms of DoS/DDoS attack
  • Categories of DoS/DDoS Attack Vectors
  • DoS/DDoS detection techniques
  • Session hijacking
  • Application level session hijacking
  • Network level session hijacking
  • Intrusion Detection System (IDS)
  • Types of Intrusion Detection Systems
  • Introduction to Firewalls
  • Types of Firewalls
  • Introduction to Honeypots
  • Evading IDS
Hands-On/Demo:
  • DoS Attack using LOIC Tool 
  • Cross-site Scripting attack
  • Demonstration on cookie stealing

TRAINING FEATURES


Instructor-led Live Sessions

24 Hours of Online Live Instructor-led Classes. 

Training Schedule: 8 sessions of 3 hours each.

Assignments

Each Cybersecurity Training class will be followed by practical assignments.

Lifetime Access

You will get lifetime access to LMS where presentations, quizzes, installation guides & class recordings are available.

24 x 7 Expert Support

We have a lifetime 24x7 online support team to resolve all your technical queries, through a ticket based tracking system.

Certification

Successfully complete your final course project and Edureka will certify you as a Cybersecurity Professional.

Forum

We have a community forum for our learners that further facilitates learning through peer interaction and knowledge sharing.

PREREQUISITES