CYBER SECURITY

  1. Home
  2. »
  3. CYBER SECURITY

Introduction to Cyber Security

➢ Threat and Vulnerability Landscape
➢ Objectives and Goals
➢ Security, Vulnerabilities, threats
➢ Tech Brief – Privacy and Anonymity and Pseudonymity
➢ Risk Assessments
➢ Threat Modeling
➢ Security Principle’s
➢ OSINT
➢ Vulnerabilities and Exploit Landscape
➢ Hackers vs Crackers
➢ Deep and Dark Web
➢ Dark Markets

Information Security Laws

➢ HIPPA
➢ FISMA
➢ GDPR
➢ IT-ACT
➢ PCI-DSS

Malicious codes

➢ Virus
➢ malware
➢ rootkits
➢ RAT’s
➢ Spyware
➢ Adware
➢ Scareware
➢ PUPs
➢ CPU Mining and Cryptojackers

Social Engineering

➢ Phishing
➢ vishing
➢ SMShing
➢ Spamming
➢ Doxing

Cyber Threat Intelligence

➢ Spies and Secrets
➢ Indian Cyber Organizations

Cryptography

➢ Tech Brief
➢ Types of Encryption
➢ Symmetric vs Asymmetric
➢ Hashing
➢ SSL/TLS
➢ PGP
➢ CA and HTTP
➢ Steganography

Our Own Lab

➢ Setting our lab
➢ Vmware and Virtual box
➢ Portable linux os (Kali, redhat, Parrotsec)

Windows & Linux Security and Privacy

➢ Tech Brief
➢ Vulnerabilities and Exploits
➢ Privacy and Tracking
➢ Privacy theft via Voice recognition
➢ UAC Bypass

Secuiryt & Anonymity OS

➢ QubesOS
➢ Subgraph OS
➢ Trisquel OS
➢ Tails
➢ Whonix

Isolation and Compartmentalization

➢ Tech Brief
➢ Hardware Isolation
➢ Virtual Isolation (8:36)
➢ Sandbox Isolation
➢ Hardening Vm

Incident Management

➢ Preparing
➢ Identification
➢ Containment
➢ Eradication
➢ Recovery
➢ Reporting

Added Features

➢ Resume Preparation
➢ Resume Preparation Tips
➢ Sample Resumes
➢ Soft copy of Notes for each module
➢ 4 case studies on use case diagrams
➢ 2 Real-time project specifications

Interview Preparation

➢ Interview Preparation Tips
➢ Sample Interview Questions
➢ How to clear an Interview