The rising demand, Cyber Security, is indeed a technology that is required for data privacy, data confidentiality, and data trust. It is defined as a risk management approach and a set of tools that are designed to shield the programs, networks, or devices from unauthorized access or cyber-attacks, by involving the best possible practices and training. Cyber-theft is not only government and business-related issues, but fields like manufacturing, finance, and healthcare too, are suffering from cyber breaches. They hire cyber security professionals to safeguard their valuable and confidential data.
What you'll learn
Introduction to Ethical Hacking
Basics of Internet, Networking
Introduction to Hardware Hacking and Reverse
Mobile Forensics: SIM Card, Android
architecture, Android File System, Android application
Memory & SIM acquisition
Cybercrime investigation: Pre investigation, SOP
for Investigation; Case scenarios: social media crime
Passwords, Security questions, Challenge-response,
Cryptographic hash functions, Biometrics
Phishing, Firewall and Intrusion Detection
Goals of Malware Analysis, AV Scanning, Hashing,
Creating Fake Networks
SSL and Certificates
Cloud computing vs. Cluster computing vs. Grid Computing
Overview of Security Issue
PC/Laptop with good internet speed
No previous Knowledge required
WIFI hacking Tools
Hacking through a live booting.
Facebook account hacking on local server.
Gmail account hacking on local server.
Hide a text file in an image file
Hide a text file in an audio/video file.
Hide executable file in an image file
Sending a fake email
Creation of a virus to automatically shut down the computer.
Shutdown the laptop by sending an email.
Creation of virtual environment for session hijacking.
Sniffing of username and password from a virtual network
Cyber Forensic : Live Case Studies