Cyber Security Expert Training Course Content v1
Cyber Security Expert Training Course Content v1
Cyber Security
Expert Training
Course Highlights
Learn with 52-Hrs of
Practical Instructor-Led
Approach Training
www.infosectrain.com
» YOUR LEARNING PATH
Course 1
Hands-on SOC Expert
Course 2
Hands-on Penetration Testing
Expert ‘s Certificate
You will get certificate by Infosectrain
TOOLS COVERED
MANY
MORE...
www.infosectrain.com
COURSE DESCRIPTION
OVERVIEW
The Cyber Security Expert training course offered by InfosecTrain is a
comprehensive program that integrates SOC and Penetration Testing
domains. It provides a comprehensive introduction to the fundamentals of
Ethical Hacking and Penetration Testing. Throughout the course, participants
will gain theoretical knowledge and practical skills by engaging in hands-
on activities and using various tools and techniques. They will learn about
different types of hackers, the importance of security, and the CIA Triad.
The course also focuses on understanding network protocols, OSI model,
IP addressing, operating systems, information gathering, blue team
operations, threat intelligence, incident response, and so much more.
www.infosectrain.com
WHY CYBER SECURITY
EXPERT TRAINING COURSE
WITH INFOSECTRAIN?
InfosecTrain is a leading IT security training and consulting organization
offering best-in-class yet cost-effective, customized training programs
to enterprises and individuals across the globe. We offer role-specific
certification training programs and prepare professionals for the future.
Our Cyber Security Expert training course will equip you with a comprehensive
overview of essential topics in the field of cyber security.
Here’s what you get when you choose InfosecTrain as your learning partner:
• Flexible Schedule: Training sessions to match your schedule and
accommodate your needs.
• Post Training Support with No Expiry Date: Ongoing assistance
and support until the learners achieve their certification goals.
• Recorded Sessions: Access to LMS or recorded sessions for
post-training reference.
• Customized Training: A training program that caters to your specific
learning needs.
• Knowledge Sharing Community: Collaborative group discussions to
facilitate knowledge sharing and learning.
• Certificate: Each candidate receives a certificate of participation as
a testament to their accomplishment.
• Expert Career Guidance: Free Career Guidance and support from
industry experts.
www.infosectrain.com
TARGET AUDIENCE
• System Administrators
• Network Administrators
• Penetration Testers
• IT Security Professionals
• Security Consultants
PRE-REQUISITES
• Prior knowledge of networking fundamentals, OS basics,
and troubleshooting
www.infosectrain.com
COURSE OBJECTIVES
You will be able to:
hacking phases
vulnerability assessment
13. Understand cloud computing and set up AWS for penetration testing
www.infosectrain.com
COURSE CONTENT
• Module 1: Security Terminologies, OS Basics and Network
Fundamentals [Theory]
• Module 2: Introduction to Pen-Testing [Theory]
• Module 3: Linux Operating System Fundamentals [Practical]
• Module 4: Information Gathering / Footprinting
• Module 5: Scanning
• Module 6: Enumeration
• Module 7: Vulnerability Analysis
• Module 8: System Hacking
• Module 9: Windows Operating System Fundamentals [Practical]
• Module 10: Blue Team Operations Architecture
• Module 11: SIEM - Nervous System of SOC
• Module 12: Importance of Threat Intelligence
• Module 13: Social Engineering
• Module 14: Basics of Incident Response & Forensics
• Module 15: Web Application Threats and Concepts
• Module 16: Cryptography
www.infosectrain.com
MODULE 1:
SECURITY TERMINOLOGIES, OS BASICS AND NETWORK
FUNDAMENTALS [THEORY]
• CIA Triad
• Hacking Concepts
• TYPES OF HACKERS
» Black Hat
» White Hat
» Gray Hat
» Suicide Hacker
» Script Kiddies
» Hacktivist
• DOMAINS OF CYBERSECURITY
» Offensive Security
» Defensive Security
www.infosectrain.com
• TYPES OF ATTACKS
» Phishing
» Vishing
» Smishing
» DoS
» Malware
» Insider Threat
• NETWORK FUNDAMENTALS
» OSI Model
» TCP/IP
» Network Protocols
» IP Addressing
www.infosectrain.com
MODULE 2:
INTRODUCTION TO PEN-TESTING [THEORY]
• What is Penetration Testing?
www.infosectrain.com
MODULE 3:
LINUX OPERATING SYSTEM FUNDAMENTALS [PRACTICAL]
• Linux Directory Services
MODULE 4:
INFORMATION GATHERING/FOOTPRINTING
• Footprinting Concepts
» Shodan
» Censys
» Spiderfoot
» Netcraft
» Harvester
» MxToolbox
» Eagle OSINT
www.infosectrain.com
• DIFFERENT TECHNIQUES FOR WEBSITE FOOTPRINTING
» Wappliyzer
» Whois
» Netcraft
» crt.sh
» DNS Dumpster
MODULE 5:
SCANNING
• SCANNING CONCEPTS
» Steps of Scanning
» Installation of Nessus
» Working of Nmap
www.infosectrain.com
MODULE 6:
ENUMERATION
» Enumeration concepts
MODULE 7:
VULNERABILITY ANALYSIS
• Vulnerability assessment concepts
MODULE 8:
SYSTEM HACKING
• Password cracking and gaining access techniques [Practical]
www.infosectrain.com
MODULE 9:
WINDOWS OPERATING SYSTEM FUNDAMENTALS
[PRACTICAL]
• INVESTIGATING WINDOWS OPERATING SYSTEM
» Reliability Monitor
» Event Viewer
• Scheduled Tasks
• File Analysis
• SysInternals Suite
• Command Prompt
www.infosectrain.com
MODULE 10:
BLUE TEAM OPERATIONS ARCHITECTURE
• What is SOC?
• Functions of SOC
• Incidents vs Events
• Concept of Logging
MODULE 11:
SIEM - NERVOUS SYSTEM OF SOC
• Why do we need SIEM?
• What is SIEM?
• Splunk setup
• Working of Splunk
• UI Navigation
www.infosectrain.com
• Search Queries using SPL
• Adding logs
• Analyzing logs
MODULE 12:
IMPORTANCE OF THREAT INTELLIGENCE
• What is a threat?
MODULE 13:
SOCIAL ENGINEERING
• Social engineering concepts and phases
www.infosectrain.com
MODULE 14:
BASICS OF INCIDENT RESPONSE & FORENSICS
• Incident Response Lifecycle
• Forensics Fundamentals
• Email Forensics
MODULE 15:
WEB APPLICATION THREATS AND CONCEPTS
• What is a web application?
• OWASP Top 10
• Cryptographic Failures
• Injection [Practical]
• Insecure Design
MODULE 16:
CRYPTOGRAPHY
• Symmetric Encryption
• Asymmetric Encryption
• Application of cryptography
• Steganography [Practical]
• Cryptanalysis [Practical]
www.infosectrain.com
COURSE BENEFITS
Hiring Companies
Source: Glassdoor
www.infosectrain.com
www.infosectrain.com I [email protected]