0% found this document useful (0 votes)
8 views

Cyber Security + Ethical Hacking Syllabus Syllabus (1)

Uploaded by

leo playmaker
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Cyber Security + Ethical Hacking Syllabus Syllabus (1)

Uploaded by

leo playmaker
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CYBER SECURITY TRAINING SYLLABUS

1. CYBER SECURITY FUNDAMENTALS

2. WIRESHARK
1. Introduction to Wireshark
2. Capture traffic
3. Create and apply display filters and capture filters
4. Colorize traffic
5. Analyze FTP traffic
6. Analyze HTTP traffic
7. Analyze DHCP and DNS traffic
8. Analyze TCP traffic
9. Analyze WLAN traffic
10. Analye suspect traffic
11. Analyze Network scan
12. Malware traffic analysis
13. Troubleshooting TCP using wireshark
14. Network forensics overview

3. IBM QRadar
1. Introduction to SIEM
2. Introduction to IBM QRadar
3. Offensive Analysis
4. Rules and building block design
5. Threat hunting
6. Dashboard Management
7. Searching and Reporting

4. SPLUNK
1. Splunk Fundamentals
2. Splunk Components
3. Splunk Architecture
4. Splunk Licensing
5. Splunk Configuration
6. Splunk Searching and Reporting
7. Splunk Troubleshooting

www.networkbulls.com
ETHICAL HACKING TRAINING SYLLABUS
1. LINUX FUNDAMENTALS
1. Introduction to linux
2. Kali linux installation
3. Create and edit text files
4. Create,delete,copy and move files and directories.
5. Manage basic networking
6. Manage users and groups
7. Start and stop services
8. Installing and updating tools
9. Configure local storage
10. Introduction to bash scripting

2. CEHv12
1. Introduction to Ethical Hacking
2. Foot Printing and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT and OT Hacking
19. Cloud Computing
20. Cryptography

www.networkbulls.com

You might also like