Whatsapp +923457143381
Join 20 Batch in February!
info@skillifyonline.com
Digital Marketing course skillify

Cyber Security Certification

25,000/- PKR     

This Course Includes

 Introduction to Cybersecurity

  • Objectives of Cybersecurity

  • Roles in Cybersecurity

    • Cybersecurity Analyst, Ethical Hacker, SOC Specialist, etc.

  • Differences between Information Security and Cybersecurity

  • What is Cyberspace?

  • What is Cybersecurity?

    • The need for cybersecurity in today’s connected world.

  • Why is Cybersecurity Important?

    • Case studies of recent cyber-attacks and breaches.

  • Prerequisites of Cybersecurity

    • Basic knowledge of networks, operating systems, and security fundamentals.

  • Introduction to Kali Linux

    • Role in penetration testing and ethical hacking.

  • Different Flavors of Linux for Hacking and Penetration Testing

    • Kali, Parrot, BlackArch, etc.

  • Lab Setup and Virtualization

    • Setting up VMs for ethical hacking environments.

    • OS installations on VirtualBox/VMware.

  • Current Security Landscape

    • Overview of the current state of cybersecurity threats and defense.

  • Common Security Principles

    • Confidentiality, Integrity, Availability (CIA).

  • Security for SOHO, Data Centers, Cloud, and Virtual Environments

    • Secure configurations for different environments.


 System Setup & Basic Security Tools

  • Prerequisites Review

    • Kali Linux, Windows CMD

  • Kali and Parrot Linux Setup

    • Directory structure, basic and admin commands.

  • Windows CMD Commands & PowerShell

    • Basic command-line skills for Windows.

  • Windows Registry Management

    • Registry settings and their impact on security.

  • Secure Access Management

    • In-band vs. Out-of-band management.

    • Hardening management planes.

    • Configure secure access through SNMP v3.

  • Task Execution

    • Practical tasks .


 User Management, Permissions & Firewalls

  • User Management in Windows & Linux

    • Linux user groups, file/folder permissions.

    • NTFS Permissions in Windows.

  • File and Folder Permissions in Linux

    • Access Control Lists (ACLs) and special permissions.

  • Data Sharing with SMB

    • Configuration and security considerations.

  • Introduction to Cisco ASA 5500-X Next-Gen Firewalls

    • Overview and installation of ASA 9.61v, management via Cisco ASDM.

  • Task Execution

    • Practical tasks .


 Service Management, Firewall, and Automation

  • Service Management with systemctl

    • Managing services on Linux.

  • Automating Tasks with Crontab and Windows Scheduler

    • Scheduling tasks in Linux and Windows.

  • Windows Defender and Real-Time Virus Protection

    • Configuring and testing virus protection tools.

  • Iptables Firewall Configuration

    • Managing inbound and outbound traffic rules.

    • Firewalld and TCP Wrapper.

  • SELinux and Rules

    • Security-Enhanced Linux: Basics and configuration.

  • Password Policy with PAM (Pluggable Authentication Modules)

    • Configuring password policies on Linux.

  • Cisco ASA Firewall Technologies

    • Basic firewall initialization, firewall access control.

  • Task Execution

    • Practical tasks .


 Disk Management and NAT Configuration

  • Disk Management in Linux and Windows

    • Partition management, SWAP, and LVM partitions.

  • Windows Disk Management Tools

    • Using the built-in Windows tools for disk management.

  • NAT Configuration on ASA (IPv4/IPv6)

    • Object/Auto NAT, Source vs Destination-based NAT.

    • NAT traversal techniques.

  • Task Execution

    • Practical tasks .


 Scripting & Programming for Security

  • Windows CMD Commands & PowerShell Scripting

    • Writing batch scripts and PowerShell scripts for automation.

  • Linux Shell Scripting

    • Creating .sh scripts, variables, and basic Linux scripting.

  • Python for Security

    • Writing basic Python scripts for automation and analysis.

  • PHP Basics for Web Security

    • Using PHP for simple security scripting.

  • Routing Configuration on ASA

    • Static and dynamic routing protocols, VLANs, and sub-interfaces.

  • Secure DMZ Design and Implementation

    • Implementing a secure Demilitarized Zone (DMZ) in a network.

  • Task Execution

    • Practical tasks .


 Server Applications and Virtualization

  • Data Sharing Apps and Servers

    • Configuring DHCP and DNS Servers.

    • Understanding the DORA process (DHCP Discover, Offer, Request, Acknowledge).

  • Web Server Configuration: Apache, Nginx, IIS

    • Setting up and securing web servers.

  • Virtualization/Context in ASA

    • Deploying firewall modes in ASA: Routed/Layer 3 and Transparent mode.

  • Task Execution

    • Practical tasks .


 Web & Mail Servers Security

  • Web Server Security

    • Apache, Nginx, IIS configurations and best practices.

  • Mail Server Security

    • Configuring and securing SMTP/POP3/IMAP.

  • High Availability ASA Firewall Configurations

    • Active-Passive and Active-Active firewall deployment.

    • Redundant Interfaces and Aggregated Interfaces.

  • Task Execution

    • Practical tasks .


 Cryptography and Steganography

  • Encryption, Decryption, Hashing

    • Symmetric vs. Asymmetric encryption.

  • Public/Private Key Infrastructure (PKI)

    • SSL, TLS, and Email encryption protocols.

  • Steganography

    • Hiding data in pictures, videos, and documents.

  • Homography Attacks and Countermeasures

    • Exploiting homography in phishing attacks.

  • Task Execution

    • Practical tasks .


 Password Cracking and Security Measures

  • Windows & Linux Password Cracking

    • Cracking .pdf, .rar, BIOS, and mobile passwords.

  • Cisco ASA FirePower (FTD)

    • Evolution, deployment models, and initial setup.

  • Task Execution

    • Practical tasks .


 Footprinting and Reconnaissance

  • Elements of Information Security

    • Threats, attack vectors, and defense techniques.

  • Ethical Hacking Concepts

    • Phases of hacking, ethical hacking processes.

  • Penetration Testing Process

    • Overview and methodology.

  • FirePower Access Policy Components

    • Security Zones, creating individual objects, and groups.

  • Task Execution

    • Practical tasks .


 Network Scanning and Enumeration

  • Network Scanning Concepts

    • Using scanning tools to check for live systems, open ports.

  • Advanced Scanning Techniques

    • Banner grabbing, scanning beyond IDS/Firewalls.

  • Netbios, SNMP, LDAP, NTP Enumeration

    • Techniques for different network enumeration methods.

  • Enumeration Penetration Testing

    • Practical penetration testing with enumeration countermeasures.

  • Cisco FTD Pre-filter Policy Configuration

    • Filtering based on Networks/Ports, Web URLs, and Applications.

  • Task Execution

Shopping cart

0
image/svg+xml

No products in the cart.

Continue Shopping