Introduction of Cyber world

This well as session is introductory to make participants familiar with cyber world.It will cover essential used in cyber security and cyber crime as various threats associated with cyber world. Terms and terminologies used in information security will be discussed that will help participitants to clear their concepts regarding information security field.

 

Network Fundamental

Networks are defined as medium for communication between two or multiple systems, i.e. it constitutes a mechanism of information that travels across multiple devices using various mediums.

The module is designed to understand the basics of networks and how data is transmitted through network, along with various Ports and Protocols. what devices are used for the data transmission i.e. hardware associated with networking like switches, router, hub etc along with types of network, internet protocol v4 & v6, ports & protocols, domain name system and its working.

 

Virtualization

The module at beginning will define the basic terminologies, introduction of operating systems and technical aspects will follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box.

Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

 

Open source Intelligence


The module at beginning will define the basic terminologies, introduction of operating systems and technical aspects will follow in the later part of module that includes how multiple operating systems are installed and configured in virtual box.

Course aims to implement understanding of how virtual machines are separated inside the same physical host and how they communicate with lower hardware levels, working of virtualization technology and components involved and the essentials to setup a lab for further modules in this course like web application hacking, malware analysis.

 

Cryptography

 

For Information protection data security is essential and thus it needs to be encrypted. The module begins with introduction of cryptography from its origin to traditional methods and modern techniques. Application of cryptography in information security and data protection techniques.

The second half of the module Explore and describe basic concepts of cryptography including secret key and public key systems, encoding and decoding. Difference between encryption and encoding along with techniques and methods of decryption.

 

 

Malware attacks and detection

 

The course will cover basic terminologies and concept of Malware - definition, why and how it is affecting the network and the system, key tools and techniques of malware attacks.

Students will be briefed about creating Malware and various types of malware (virus, worms, trojans, keyloggers etc. ).

Module will give insight of methods used to remove virus from system.

Web Application Attacks

The module includes the basic fundamentals of web application including some client side and server side scripting and possible web application attacks like SQL Injection, cross site scripting, local file inclusions and remote file inclusions and also medium level attacks like click jacking etc. Introductory knowledge of database and working with database using SQL queries along with installation and working for local servers. Basic working of HTTP with request and host examples.

 

Network Attacks

The module will begin with an introduction of loopholes in protected wi-fi networks and its testing. Students will be able to learn, how to test security of a protected wifi network. In the later phase module will include hands on demonstration of internal network attacks like sniffing, MITM, DNS cache poisoning. Introduction of misconfigurations and loopholes in router security.

 

MetaSploit

Metasploit is a framework which allows a security tester to arrange their exploits and launch them easily and how metasploit cover different types of pre build exploits. The scope of exploitation after compromising a particular system and its effect on network and user. The module cover exploitation techniques for different types of systems like windows, android, MAC.

 

Cyber Crime and cyber Law

This session will include various cyber crime cases and criminal modus operands. Also will be discussed various cyber crime cases