Cc
@ NATIONAL INITIATIVE FOR ARTIFICIAL
INTELLIGENCE & SECURITY
NIAIS
ft ONLINE Rett
OUTLINE
Become a Professional
CYBER SECURITY
GOO ® wwwziais.org | [email protected] | 0324 8900930Cyber Security
Course Description:
Cybersecurity is a growing industry, and it’s not just about protecting
your data anymore. Now you have to protect your company’s intel-
lectual property and conduct business in an ethical way that doesn't
compromise your privacy or the privacy of others.
Tam en Reel em (od om Mn MUA nema Lee aA ATL
data is, how it's converted into cash, and how attackers exploit their
targets. We'll also talk about cyber security challenges in the indus-
try—and how you can prepare yourself for them.
The first part of this class will focus on learning the basics of cyber
security: threats, vulnerabilities, and risks. We'll cover host-based
F-\ae- Col CM-L ANCL UDA Le oh Noa lt- LMCI LAe)
Trojan horses in software utilities. We'll also discuss network attacks
such as distributed denial of service (DDOS) and botnet - attacksTrainer Profile
MR. ABDUL REHMAN
| am a software engineer with a strong passion for teach-
ial: Mony eX aay ar Nia etd (arom idole (— ae la ee
vate and government organizations for the past six
years, and am highly dedicated to providing the best
possible guidance to my students. | am a Certified Ethi-
cal Hacker, Digital Forensics Expert, Cyber Security Con-
sultant, and Android Anatomy Expert, and have gained
recognition for my expertise in these areas.| always
strive to be at the top of my field and to share my
knowledge and skills with others.
GOO S® wmriais.org | administrationCOURSE OUTLINE
MODULE 1. CYBER SECURITY AWARENESS
& Course Introduction
bes TU CCH K0) (a)
MUL oid
‘ Course Applications
4 Institute/work ethics
S Introduction to Cyber Security
4 Objectives
bea)
ey acec alec oli els ua LACOAMcVelU lM Lae
and cyber security
ben Late L en SN] 81-16 8Y- (ard
A ieee ome celalayre
A NM CMO oe ool ai aVm in ecelae- late
& Who is a Hacker?
MODULE 2. ETHICAL HACKING AS A CAREER
4 Introduction to Ethical Hacking
& What is Ethical Hacking
be Noel Malo
4 Govt.Laws of Hacking
MODULE 3. PENETRATION TESTING
4 What is penetration testing?
Malema om) AcoMOl Mm OLatsiae LAO Kolm Aled
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 4. OVERVIEW OF KALI LINUX
Pa elUme(9) han)
S Exploit methods
% The Kali menu and toolbox
MODULE 5. PREPARING THE DEVELOPMENT
ENVIRONMENT
G Installing a virtual machine
be laie-lluiarem-laremecelal areola larcm Colum MinleD4
S Installing and configuring Python Kali Linux
‘ Setting up a Box Lab
% Kali Linux Overview
S Lab Tracking Disable
S Linux file system
MODULE 6. FOOT-PRINTING AND RECONNAISSANCE
& Understanding the Basics of Footprinting
and Reconnaissance
‘ What Is Network Footprinting?
Wart eet 1114
S Footprinting Methodology
S Information Gathered Through Footprinting
MODULE 7. BASIC NETWORK CONCEPT
EROS ENS c ne manlelel
S TCP/IP & UCP eave Lae)
4 Basic Network topologies
& Network Design
% Internet protocol (ip) Addressing
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 8. SCANNING NETWORKS
& Scanning Networks &Enumeration
bes DY =t eta YMA aT MN LAO) MeercTAT NT acme) N(e=) 9 6
% Use various scanning tools
Pena elmer Ua aN am Ke Munro a Colm UVR CLE ALe]
open ports
% Perform scanning by using various scanning
techniques
& Scan beyond intrusion detection system (IDS)
Elie AlKnclle
ee oa (oma Y= Ua a led) ) 014
% Draw network diagrams using network discovery
tools
% Perform scanning penetration testing
G Describe the enumeration concepts
‘ Explain different techniques for Netbios
enumeration
beam co aMeN ACR) h Lem Cena (e|6 | CO]MES i es
enumeration
ce col AMenla (Ke nlem k—CeUnl ae [0a Co) MD) \ cd
enumeration
ce ele UMAR Lecce (emo Ten ie-1a(e)f)
eee UMeliiR- nl meen (CLM aL]
DNS enumeration
S Explain other enumerations such as IPsec,
VoIP, RPC, and Linux/Unix enum
bear Vo AU ielaC Mae e mL U Cory
& Perform enumeration penetration testing
GOO S ria. org | [email protected] | 0COURSE OUTLINE
MODULE 9. SYSTEM MOBILE HACKING
‘ Describe the Hacking Methodology
% Explain different techniques to gain access to
iS
G Apply privilege escalation techniques
G Explain different techniques to create and
maintain remote access to the system
& Describe different types of rootkits
em odo) CUA a=s"t- Ln e)4 = 9)IV-LNLOReorr-UT UI
techniques
& Apply different techniques to hide the evidence
Colon) ce
ee la OME CoM a-CeLc Lm Lat aae-1a(laorla ald
MODULE 10. MALWARE THREATS
& Describe the concepts of malware and malware
propagation techniques
G Describe the concepts of Trojans, their types,
and how they infect systems
& Explain the concepts of viruses, their types,
and how they infect fi
G Explain the concept of computer worms
‘ Perform malware analysis
G Explain different techniques to detect malware
ee \ eo WAUT-lAn lk mee LUN KALI eK)
& Perform malware penetration testing
GOO S ria. org | [email protected] | 0COURSE OUTLINE
MODULE 11. SNIFFING & SESSION HIJACKING
peed TARTU AA LN -meCe)n [OL
% Explain different MAC attacks
ee cele CK 01 OL ee-La LoL
& Describe the ARP poisoning
& Explain different MAC spoofing tracks
4 Describe the DNS poisoning
PAS Miia ilom cele
ee No) WAAL AMN MOCO Cla tacr Ucar)
4 Apply various techniques to detect sniffing
G Perform sniffing penetration testing
MODULE 12. SOCIAL ENGINEERING
Pee mam ele Ml oa im xe] 1
% Perform social engineering using various
techniques
bem seta Mae Tm an es 1
% Perform impersonation on social networking
Sie)
% Describe identity theft
% Apply social engineering countermeasures
eNom ClCH NULL
RU CMe MC)
% Perform social engineering penetration testing
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 13. DENIAL-OF-SERVICE
% Describe the DoS/DDoS concepts
% Perform DoS/DDOS using various attack
techniques
% Describe Botnets
‘ Describe DoS/DDOS case studies
% Explain different DoS/DDoS attack tools
‘ Apply best practices to mitigate DoS/DDOS
attacks
& Perform DoS/DDOS penetration testing
MODULE 14. EVADING IDS, FIREWALLS, AND HONEYPOTS
G Describe IDS, firewall, and honeypot concepts
& Use different IDs, firewall and honeypot solutions
Explain different techniques to bypass IDS
% Explain various techniques to bypass firewalls
4 Use different IDS/firewall evading tools
Explain different techniques to detect honeypots
% Perform IDS and firewall penetration testing
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 15. HACKING WEB APPLICATIONS & OWASP
TOP 10
& Describe web application concepts
% Perform various web application attacks
\ Describe about web application hacking
methodology
4 Use different web application hacking tools
% Apply web application attacks countermeasures
& Use different web application security testing
tools
& Perform web application penetration testing
S Describe the SQL injection concepts
% Perform various types of SQL injection attacks
% Describe SQL injection methodology
eam ecnlees le Malay eld (elmore) Cy
% Explain different IDS evasion techniques
% Apply SQL injection countermeasures
MODULE 16. HACKING WIRELESS NETWORKS
& Describe wireless concepts
bee dP) al MAL Ko CM nel ay] La (ela-lCxe a (ant)
G Describe wireless threats
‘ Describe wireless hacking methodology
pO Mela CN LON NIK CocMm aTeTeL.d alma mele) C3
% Describe Bluetooth hacking techniques
bear Ne) 91 NANAK Corm ar-CeLa atm ele neo an acrtSU Koy
4 Use different wireless security tools
ana MUMAiK Men ee-laeDmKa ed
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 17. HACKING MOBILE PLATFORMS
% Understand various Android threats and attacks
be Olalel—iaie-laTe MZ la lel cm Osa nike e-LaTe MLA RCo)
‘ Use various mobile spyware
% Describe Mobile Device Management (MDM)
% Apply various mobile security countermeasures
& Use various mobile security tools
& Perform mobile penetration testing
MODULE 18. NETWORK SECURITY FUNDAMENTALS
& Security Through Network Devices
% Standard Network Devices
Sela old asa La a a EUK lA LUE)
% Security Through Network Technologies
% Network Address Translation (NAT)
& Network Access Control (NAC)
% Security Through Network Design Elements
& Demilitarized Zone (DMZ) o Subnetting
& Virtual LANs (VLANs)
% Remote Access
GOOF wwnniais.org | [email protected] | 0324 8900930COURSE OUTLINE
MODULE 19. BASH SCRIPTING
WS ees Sa Sel La
% Running your own Script
& Using the Metasploit Framework
& Starting Metasploit
% Finding Metasploit Modules
\ The Module Database
% Built-In Search
‘ Setting Module Options
MODULE 20. DIGITAL FORENSIC IN CYBER SECURITY
& Digital Evidence
S Network Traffic investigation
beso LANs aiex- 180)
G File & Folder Investigation
4 Investigation Report
GOOF wwnniais.org | [email protected] | 0324 890093014 RE
Recorded Lectures + Online Zoom Sessions
Certification Included
Internationally Recognized Course Content
Internship Opportunity
100% Practical Approach
100% Affordable Fee
24 Hours Support
We teach you step by step from beginner
to advance level
GOOG wwnniais.org | [email protected] | 0324 8900930oF N14
aor
Moaunccukcsta menus :
Tsar rig a
yp 5 4
aN ATG N= .
a ent y @ eye na
NN A A
ha x 1 aoe
tye ee Lea
FZ