Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
24 views6 pages

Cyber Security & Penetration Testing Course Outline - 2023

The document outlines three courses: Cyber Security & Penetration Testing, CCNA Networking & Routing, and Red Hat System Administrator & Server Engineering. Each course covers various topics, including network fundamentals, penetration testing methodologies, Linux system administration, and security practices. The curriculum is designed to equip learners with practical skills and knowledge for securing networks and systems against threats.

Uploaded by

hemantborse19844
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views6 pages

Cyber Security & Penetration Testing Course Outline - 2023

The document outlines three courses: Cyber Security & Penetration Testing, CCNA Networking & Routing, and Red Hat System Administrator & Server Engineering. Each course covers various topics, including network fundamentals, penetration testing methodologies, Linux system administration, and security practices. The curriculum is designed to equip learners with practical skills and knowledge for securing networks and systems against threats.

Uploaded by

hemantborse19844
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CYBER SECURITY & PENETRATION TESTING COURSE OUTLINE - 2023

CCNA NETWORKING & ROUTING COURSE OUTLINE


• Perform Basic Configurations For Routers, Implement Ipv4-Ipv6 Addressing Schemes. Configure
Routers, End Devices To Provide Access To Local & Remote Network Resources & To Enable End-
To-End Connectivity Between Remote Devices. Develop Critical Thinking & Problem-Solving Skills
Using Real Equipment & Cisco Packet Tracer. Configure & Troubleshoot Connectivity A Small
Network Using Security Best Practices.
No TOPICS DETAILS
1 Network fundamental • Network Component, Diagram, Speed, Connection
2 OSI • OSI model, Encapsulation, Addressing (port, IP, MAC)
3 Sub netting • Network & Host-Based Sub Netting (Class C, B, A)
4 VLAN • VLAN & Inter VLAN
5 Base routing concept • Routing, Types, Static, Default & Dynamic
6 ACL • Concept, Config Standard ACL, Extended ACL, Telnet ACL
7 NAT • Concept Config NAT Overload, Dynamic NAT, Static NAT
8 IPV6 • Concept Config
9 Practice • Practice on Above Topics
Red Hat System Administrator & Server Engineering Course Outline
• Red Hat® Enterprise Linux® Server Is an Easy-To-Administer, Simple-To-Control Operating System That Can
Be Deployed on Physical Systems In the Cloud Or As A Guest On The Most Widely Available Hypervisors.
No Topics Details
1 Introduction (Installation) • Configuration of System Devices & Functionality Lab Over View
2 Accessing Command Line • Login to A Linux System & Run Simple Command Using the Shell
Managing Files & File System • File Operations Using Bash Shell, Prompt, Understanding
3
Hierarchy Absolute & Relative Paths.
• Using Help, Man, Pinfo, Sosreport, Viewing And Printing
4 Getting Help From RHEL
Documentations.
• Explain Three Main Mode of Vim | Open, Edit, & Save Text Files
5 Working with Text Files & Vim
• Use Editor Shortcuts, I/O Redirections & Pipelines.
• Manage Local Linux Users and Groups & Administer Local
6 Local Linux Users & Groups
Password Policies.
• Set Linux File System Permissions on Files and Interpret the
7 File Permissions
Security Effects of Different Permission Settings.
8 ACLs Manage File Security Using Posix Access Control Lists.
Configuring Basic IPv4 Networking on Red Hat Enterprise Linux
9 Networking
Systems.
10 S / W Packages (Yum, Rpm) Installing Packages Using Rpm & Creating Yum Server.
11 Services & Daemons Using Systemctl To Manage Services, Daemons, Sockets & Targets
12 Open SSH Accessing Remote Command Line Using SSH.
13 Logs Analyzing & Storing Logs, Finding Events with Journalctl.
14 Partitions & LVM Managing Partitions, File Systems & Logical Volume Manager.
15 Firewalls Configuring Basic RHEL Firewall.
Manage Security Enhanced Linux (Selinux) Behavior of A System
16 Selinux
to Keep It Secure in Case of a Network Service Compromise
17 Providing File-Based Storage Exporting NFS File System | Providing SMB File Shares.
DNS Concepts | Configuring A Caching Nameserver | DNS
18 Managing DNS For Servers
Troubleshooting.
Providing Apache HTTPD Web Configuring Apache HTTPD | Configuring HTTPS | Integrating
19
Service Dynamic Web Content.
Configuring MariaDB Installing MariaDB | Working with MariaDB | Managing Database
20
Databases Users & Access Rights | Creating & Restoring MDB Backups
21 Writing Bash Scripts Bash Shell Scripting Basics.
PENETRATION TESTING COURSE OUTLINE
Penetration Testing Is Also Generally Referred To As A Pen Test (Or Ethical Hacking). With An
Increase In Sophistication, White Hat Testers Are Also Increasing To Ensure That Computer
Systems Remain Secure From Hackers Trying To Destroy Information Networks.
Penetration Testing Normally Evaluates A System’s Ability To Protect Its Networks, Applications,
Endpoints And Users From External Or Internal Threats. It Also Attempts To Protect The Security
Controls And Ensures Only Authorized Access
No TOPICS DETAILS
• Software Testing V/S Penetration Testing
• Types Of Penetration Testing
Introduction to Vulnerability • Network Penetration Testing
1 Assessment and Penetration Testing • System Penetration Testing
• Web Penetration Testing
• Mobile Penetration Testing
• Software Penetration Testing
• Installing Kali Linux on VM-ware or Base Machine
Lab Setup and Tools
2 • Installing Parrot OS on VM-ware or Base Machine
• Introduction to Black Arch

• What are the basic of Linux?


• What are the 5-basic components of Linux?
• What is the different between windows and Linux OS?
• Linux environment
3 Basic Linux Command • What is the Linux command?
• Why is Linux better than windows?
• Linux OS install (VM / dual boot)
• Tools installation
• Type of services use and basic installation
• What are the 4 type of networks?
• How networks are structured?
• What is different between LAN and WAN?
• Port forwarding
4 Basic Networking • Ngrok use for port forwarding
• Openvpn server installation
• Difference between TCP and UDP
• What are the different classes of IP address?
• What is the purpose of the OSI model?
• What is Github?
• How to download Github tool?
5 Github
• How to install Github tool?
• Github tool dependency troubleshoot

• What is the google hacking database?


• Is google hacking illegal?
6 Google Hacking Database • How much money do you get for hacking google?
• Google dork
• Exploit-db
• Footprinting the network
• Nmap
• Maltego
Information Gathering Methodology
7 • Advance level of Recon-ng
and Identify Vulnerabilities
• Passive information gathering
• Active information gathering
• Nikto

8 Malwares What are the different types of malware?

9 Social Engineering Phishing


• What is website hacking?
• Type of website
• Type of website database
• Type of website attack
Web Penetration • SQL Injection
10
• Cross-site scripting
• LFI/RFI attack
• Admin bypass
• File uploading attack
• File tampering
• What is sniffing and spoofing
• What is password sniffing?
• What is active and passive sniffing?
• Man in the middle attack
• Arpspoof
11 Sniffing and Spoofing
• Ettercap
• Session hijacking
• What is session hijacking attack?
• Cookies poisoning / stealing
• What is spoofing?
• What is IP spoofing
• What is SMS spoofing
• What is MAC spoofing

• What is a wireless attack?


• What does WiFi actually do?
Wireless Attack
12 • What is Wifi Deauthentication/Jamming attack
• Type of WiFi attack tool
• Wifi hacking using Fluxion Github tool
• What is firewall?
13 Firewall • What is IDS/IPS?
• Download honeypot on Ubuntu and use

• What is privileged escalation


• Linux privileged escalation
14 Privileged Escalation • Enumeration linux privileged escalation
• Type of linux privileged escalation
• Kernel explot
• What is cloud computing
• AWS EC2 use
15 Cloud Computing
• Create windows Instance
• Create Linux instance

• What is system hacking


• System hacking on lan /wan
• System hacking using Metasploit
• Shell to meterpreter
16 System Penetration
• Privileged escalation
• Browser history dump
• How to get VNC / RDP access
• How to persistence
• What is Android hacking
• Android hacking on LAN / WAN
• What is Metasploit?
17 Mobile Penetration Testing • How to use Metasploit
• Android payload
• Meterpreter access
• Different tools to make android payload & Persistence
• Reverse shell and bind shell
18 Maintaining Access Shell Connection • Web shell
• Netcat and pwncat
• Pentestmonkey shell
Advanced Tips and Techniques • Network Security
• System Security
19
• Web Based Security
• Mobile Security

• What is encryption
• Type of encryption
• Hash
• Symmetric
20 Cryptography • Asymentric
• What type of encryption is used most often?
• Data encryption standard (DES)
• Advanced Encryption Standard (AES)
• One way and two-way encryption
• Type of password attack
• Online and offline password attack
21 Password Attack
• Online password atwebtack
• Offline password attack

• What is CTF?
• CTF game website
• Root-me.org
• Tryhackme.com
22 Vulnerable Machine Hacking
• What is Hackthebox
• How to upgrade penetration skill using Hackthebox
• Generate invite code
• Why CTF important for penetration tester

You might also like