Introduction Of CYBER SECURITY
Framework orientation version
SAMA Interpretation
Control domain
Cyber security risk management
Cyber security human resources
Identity & access management
Cyber security cryptography
Cyber security event management
Third party cyber security
Types of network
Network devices
OSI Model (Layered Model)
TCP/IP MODEL
Introduction to servers and its types
PROTOCOLS
Addressing in network
Network layer implementation
Accessing the network
Advanced packet switching network
Advanced TCP/IP
Introduction to network security
Sensor networks
Network security and standards
Virtual private network
Load balancer
Introduction to various cyber attacks
Firewalls
Encryption
Virus
Access control and recovery
Cryptography
Birthday attack
Mathematical aspect of cryptography
One way authentication
Introduction to ethical hacking
Foot Printing and reconnaissance
Scanning networks
Enumeration
Vulnerability analysis
System hacking
Malware threat
Sniffing
Social engineering
Denial-of-Service
Session hijacking
Evading IDS, firewalls, and honeypots
Hacking web servers
Methodology used to audit vulnerabilities
Hacking web applications
Web application attacks
SQL Injection
Evasion techniques
Hacking wireless networks
Hacking tools
Mobile platform attack vector
Mobile device management
IoT and OT hacking
Cloud computing
cloud computing concepts
Attacks
Advanced cryptography
Cyber forensics
Identification process
Developing indigenous cyber forensics tools.
• Providing technical support to LEAs
Disk Forensics
Live Forensics.
Multimedia Forensics
Database forensics:
Defeating Anti - forensic techniques
Real time work on cryptography
Cyber Forensics
Multimedia forensics
Malware forensics: Analysis of code