Cyber Security Certification
25,000/- PKR
This Course Includes
- Full Time Access
- Access on Laptop & Mobile
- 24/7 Support
- Practical Exercises
Introduction to Cybersecurity
-
Objectives of Cybersecurity
-
Roles in Cybersecurity
-
Cybersecurity Analyst, Ethical Hacker, SOC Specialist, etc.
-
-
Differences between Information Security and Cybersecurity
-
What is Cyberspace?
-
What is Cybersecurity?
-
The need for cybersecurity in today’s connected world.
-
-
Why is Cybersecurity Important?
-
Case studies of recent cyber-attacks and breaches.
-
-
Prerequisites of Cybersecurity
-
Basic knowledge of networks, operating systems, and security fundamentals.
-
-
Introduction to Kali Linux
-
Role in penetration testing and ethical hacking.
-
-
Different Flavors of Linux for Hacking and Penetration Testing
-
Kali, Parrot, BlackArch, etc.
-
-
Lab Setup and Virtualization
-
Setting up VMs for ethical hacking environments.
-
OS installations on VirtualBox/VMware.
-
-
Current Security Landscape
-
Overview of the current state of cybersecurity threats and defense.
-
-
Common Security Principles
-
Confidentiality, Integrity, Availability (CIA).
-
-
Security for SOHO, Data Centers, Cloud, and Virtual Environments
-
Secure configurations for different environments.
-
System Setup & Basic Security Tools
-
Prerequisites Review
-
Kali Linux, Windows CMD
-
-
Kali and Parrot Linux Setup
-
Directory structure, basic and admin commands.
-
-
Windows CMD Commands & PowerShell
-
Basic command-line skills for Windows.
-
-
Windows Registry Management
-
Registry settings and their impact on security.
-
-
Secure Access Management
-
In-band vs. Out-of-band management.
-
Hardening management planes.
-
Configure secure access through SNMP v3.
-
-
Task Execution
-
Practical tasks .
-
User Management, Permissions & Firewalls
-
User Management in Windows & Linux
-
Linux user groups, file/folder permissions.
-
NTFS Permissions in Windows.
-
-
File and Folder Permissions in Linux
-
Access Control Lists (ACLs) and special permissions.
-
-
Data Sharing with SMB
-
Configuration and security considerations.
-
-
Introduction to Cisco ASA 5500-X Next-Gen Firewalls
-
Overview and installation of ASA 9.61v, management via Cisco ASDM.
-
-
Task Execution
-
Practical tasks .
-
Service Management, Firewall, and Automation
-
Service Management with systemctl
-
Managing services on Linux.
-
-
Automating Tasks with Crontab and Windows Scheduler
-
Scheduling tasks in Linux and Windows.
-
-
Windows Defender and Real-Time Virus Protection
-
Configuring and testing virus protection tools.
-
-
Iptables Firewall Configuration
-
Managing inbound and outbound traffic rules.
-
Firewalld and TCP Wrapper.
-
-
SELinux and Rules
-
Security-Enhanced Linux: Basics and configuration.
-
-
Password Policy with PAM (Pluggable Authentication Modules)
-
Configuring password policies on Linux.
-
-
Cisco ASA Firewall Technologies
-
Basic firewall initialization, firewall access control.
-
-
Task Execution
-
Practical tasks .
-
Disk Management and NAT Configuration
-
Disk Management in Linux and Windows
-
Partition management, SWAP, and LVM partitions.
-
-
Windows Disk Management Tools
-
Using the built-in Windows tools for disk management.
-
-
NAT Configuration on ASA (IPv4/IPv6)
-
Object/Auto NAT, Source vs Destination-based NAT.
-
NAT traversal techniques.
-
-
Task Execution
-
Practical tasks .
-
Scripting & Programming for Security
-
Windows CMD Commands & PowerShell Scripting
-
Writing batch scripts and PowerShell scripts for automation.
-
-
Linux Shell Scripting
-
Creating .sh scripts, variables, and basic Linux scripting.
-
-
Python for Security
-
Writing basic Python scripts for automation and analysis.
-
-
PHP Basics for Web Security
-
Using PHP for simple security scripting.
-
-
Routing Configuration on ASA
-
Static and dynamic routing protocols, VLANs, and sub-interfaces.
-
-
Secure DMZ Design and Implementation
-
Implementing a secure Demilitarized Zone (DMZ) in a network.
-
-
Task Execution
-
Practical tasks .
-
Server Applications and Virtualization
-
Data Sharing Apps and Servers
-
Configuring DHCP and DNS Servers.
-
Understanding the DORA process (DHCP Discover, Offer, Request, Acknowledge).
-
-
Web Server Configuration: Apache, Nginx, IIS
-
Setting up and securing web servers.
-
-
Virtualization/Context in ASA
-
Deploying firewall modes in ASA: Routed/Layer 3 and Transparent mode.
-
-
Task Execution
-
Practical tasks .
-
Web & Mail Servers Security
-
Web Server Security
-
Apache, Nginx, IIS configurations and best practices.
-
-
Mail Server Security
-
Configuring and securing SMTP/POP3/IMAP.
-
-
High Availability ASA Firewall Configurations
-
Active-Passive and Active-Active firewall deployment.
-
Redundant Interfaces and Aggregated Interfaces.
-
-
Task Execution
-
Practical tasks .
-
Cryptography and Steganography
-
Encryption, Decryption, Hashing
-
Symmetric vs. Asymmetric encryption.
-
-
Public/Private Key Infrastructure (PKI)
-
SSL, TLS, and Email encryption protocols.
-
-
Steganography
-
Hiding data in pictures, videos, and documents.
-
-
Homography Attacks and Countermeasures
-
Exploiting homography in phishing attacks.
-
-
Task Execution
-
Practical tasks .
-
Password Cracking and Security Measures
-
Windows & Linux Password Cracking
-
Cracking .pdf, .rar, BIOS, and mobile passwords.
-
-
Cisco ASA FirePower (FTD)
-
Evolution, deployment models, and initial setup.
-
-
Task Execution
-
Practical tasks .
-
Footprinting and Reconnaissance
-
Elements of Information Security
-
Threats, attack vectors, and defense techniques.
-
-
Ethical Hacking Concepts
-
Phases of hacking, ethical hacking processes.
-
-
Penetration Testing Process
-
Overview and methodology.
-
-
FirePower Access Policy Components
-
Security Zones, creating individual objects, and groups.
-
-
Task Execution
-
Practical tasks .
-
Network Scanning and Enumeration
-
Network Scanning Concepts
-
Using scanning tools to check for live systems, open ports.
-
-
Advanced Scanning Techniques
-
Banner grabbing, scanning beyond IDS/Firewalls.
-
-
Netbios, SNMP, LDAP, NTP Enumeration
-
Techniques for different network enumeration methods.
-
-
Enumeration Penetration Testing
-
Practical penetration testing with enumeration countermeasures.
-
-
Cisco FTD Pre-filter Policy Configuration
-
Filtering based on Networks/Ports, Web URLs, and Applications.
-
-
Task Execution
