Вы находитесь на странице: 1из 2

Cybersecurity Professional

This course is mapped to the popular Cybersecurity Professional course from the US-Council
(www.us-council.com). Zoom Technologies are the official training partners of US-Council.

This course is meant for those professionals who are looking for comprehensive and total
knowledge in the network security domain. This is the only course which teaches both hacking
and countermeasure techniques. And in keeping with Zoom's standards, this course is entirely
hands on and real time oriented. And need we say, the instructors are network security and
intrusion specialists with several years of experience. This course consists of three modules viz

1. Security Risk Assessment (Ethical Hacking)


2. Proactive Defense and Countermeasures
3. Incident Response and Management

Course Outline

• Security Risk Assessment


• Dos and DDos Attacks
• Attack Mitigation Techniques
• Firewalls, IDS, IPS
• Cryptography
• Incident Response and Management
• Log Analysis
• Forensics

We are not an Affiliated Institution. Trademarks are properties of the respective vendors.

www.zoomgroup.com
COURSE CURRICULUM

Module 1: Security Risk System?


Assessment (Ethical Hacking) Phishing • What is an Intrusion Prevention
• What is Phishing System?
Introduction to Ethical Hacking • Phishing Techniques
• What is Hacking • Phishing Tools High Availability
• What is Ethical Hacking Virtual / Cloud Devices Security
• What is Penetration Testing Malware Host Security
• What is Vulnerability Auditing • What is malware • OS Hardening
• Types of malware • Patch management
Footprinting • Malware creation Tools • Antivirus
• What is FootPrinting • USB password stealers • Endpoint Security
• Footprinting Techniques
• Footprinting Website & Tools Wireless Hacking Module 3: Incident Response and
• Types of wireless networks Management
Scanning • Wireless Hacking Techniques
• What is Network scanning • Wireless Hacking Tools SIEM
• Types of Scanners • Introduction to SIEM
• Vulnerability Scanner Tools Kali Linux • SIEM Architecture
• What is Kali Linux • Events and Logs
Proxy • Kali Linux Tools • Event Correlation and Event
• What is a proxy server Collection
• Types of proxies Module 2: Proactive Defence and • Correlation Rules
• What is a Darkweb Countermeasures • Forensic Data
• Why hackers prefer to use Darkweb • SIEM Deployment
Introduction to Security
Hacking Web Servers & Web • What is security? Incident Response
Applications • Layer 1 Security • Introduction Incident Response
• What is a web server • Layer 2 Security • Incident Response Policy
• Types of web attacks • Layer 3 security • Incident Handling
• Forensics of Incident response
Session Hijacking Firewalls • Inside Threat
• What is session hijacking • What is a Firewall? • Incident Recovery
• Session hijacking Techniques • Types of firewalls • Malware Analysis
• Session hijacking Tools • Designing Security with Firewalls
• NAT Mobile Forensics
Denial of Service • Security Policy • Forensic Acquisition of
• What is a DoS and DDoS attack • Logs Management Smartphones
• DoS attack techniques • Application Security 1. Logical Acquisition
• DoS attack Tools • Content / Web Security 2. File System Acquisition
• Authentication 3. Physical Acquisition
System Hacking • Android Forensics
• What is System Hacking Virtual Private Networks • Retrieving User Activity Information
• What is Password Cracking • What is VPNs from Android Devices
• Password Cracking techniques • Type of VPNs • iOS (iPhone) Forensics
• Password Cracking Website & Tools • GRE • Retrieving User Activity Information
• IPSEC iOS Devices
Sniffers • SSL
• What is a sniffer
• Sniffing Techniques Intrusion Prevention Systems
• Sniffing Tools • What is an Intrusion Detection

www.zoomgroup.com

Вам также может понравиться