Courses

Curriculum

PGP- Cyber Security

  • Cyber Laws
  • Introduction to Computers
  • Computer History
  • Software & Hardware
  • Classification of Computer
  • Input-Output Devices
  • Windows
  • DOS Prompt Commands. Linux/Mac Terminal and Commands
  • Basic Computer Terminology
  • Computer Security models
  • Computer Security terms & Ethics
  • Business and Professional Ethics
  • Need for cyber security
  • Cyber Frauds and crimes
  • Digital Digital Payments
  • Various Search Engines
  • Introduction to Auditing
  • Deep Web
  • VAPT
  • Smartphone Operating systems
  • Introduction to compliances
  • Globalization and border less world
    • Need for Cyber Regulations;
    • Scope and Significance of Cyber laws : Information Technology Act 2000;
    • Network and Network Security,
    • Access and Unauthorized Access,
    • Data Security,
    • E Contracts and E Forms
    • Penal Provisions for Phishing,
    • Spam,
    • Virus,
    • Worms,
    • Malware,
    • Hacking,
    • Trespass and Stalking;
    • Human rights in cyberspace,
    • International C International Co-operation in investigating
    • Cyber crimes
  • Types of networks,
  • IP Address,
  • NAT ,
  • IP Subnets,
  • DHCP Server,
  • Ports,
  • DNS,
  • Proxy Servers,
  • Virtual Private Networks,
  • DNS Server,
  • OSI and TCP IP Model,
  • Routers ,
  • Switches,
  • Endpoint
  • Solutions,
  • Access Directory,
  • TOR Network.
  • Networking Devices (Layer1,2,3) -Different types
  • of network layer attacks – Firewall (ACL, Packet
  • Filtering, DMZ,Alerts and Audit Trails) – IDS,
  • IPS and its types (Signature based,
  • Anomaly based,
  • Policy based, Honeypot based)
  • VPN and its types –Tunneling Protocols – Tunnel and Transport Mode – Authentication HeaderEncapsulation Security Payload (ESP)- IPSEC Protocol Suite – IKE PHASE 1, II – Generic Routing Encapsulation (GRE).
  • Implementation of VPNs
  • Network Sniffing
  • Wireshark
  • Packet analysis
  • Display and capture filters
  • Ettercap
  • DNS
  • Poisoning
  • ARP Poisoning
  • Denial of services
  • Vulnerability scanning
  • Nessus
  • Network
  • Policies
  • Open VAS
  • Sparta
  • Network Scanning Report Generation
  • System hardening.
  • Secure system configurations.
  • SSL Striping.
  • Setup network IDS/IPS.
  • Router attacks.
  • VPN Pentesting.
  • VOIP Pentesting
  • Network Exploitation OS Detection in network,
  • Nmap, open ports,
  • Filtered ports,
  • Virtual Private Networks
  • Network Attacks Part 1
  • Service detection,
  • Metasploit framework,
  • Interface of metasploit framework,
  • Network vulnerability
  • Assessment,
  • Evade anti viruses and firewalls,
  • Metasploit scriptin Metasploit scripting,
  • Exploits,
  • Vulnerabilities,
  • Payloads,
  • Custom payloads,
  • Nmap configuration,
  • Social Engineering toolkit,
  • Xero sploit
  • Framework,
  • Exploits delivery.
  • End Point Security
  • Protocols,
  • MAC Filtering,
  • Packet Encryption,
  • Packet Sniffing,
  • Types of authentication,
  • ARP
  • Replay attack,
  • Fake Authentication Attack,
  • De authentication,
  • Attacks on WEP ,
  • WPA andWPA-2 Encryption,
  • Fake hotspots,
  • Evil twin attack,
  • Fluxion framework
  • Encoding: Char set
  • ASCII
  • UNICODE
  • URL Encoding
  • Base64
  • Illustration: ISBN/ QR Code/Barcode
  • Binary hamming codes and Binary Binary hamming codes and Binary Reedmuller codes
  • HTML Basics,
  • XAMPP Server Setup,
  • Hosting Websites Linux,
  • Apache,
  • Virtualization,
  • Server
  • Configurations,
  • Web Application Firewalls
  • Basics of Networking
  • Introduction to Cyber Security.
  • Information Gathering.
  • Physical Security
  • Windows-10 Analysis & Hacking
  • Google Hacking
  • Application Password Hacking
  • Reverse Engineering & Software Cracking Techniques
  • Email Hacking & Tracing.
  • Malware Attacks, Backdoors & Handheld Devices Analysis.
  • Encoding
  • Web Application Architecture
  • Cyber Security & Ethical Hacking
  • Application Attacks
  • Network Attacks
  • DoS, DDoS & Buffer Overflow Attacks
  • Network Packet Analysis & Sniffing
  • Spamming
  • Firewall Technologies.
  • IDS, IPS & Honeypots Analysis.
  • Hacking Routers, Cable Modems and Firewall.
  • Cryptography with different Applications.
  • Message authentication code and Hash Functions
  • Public Key Cryptography and Bitcoin
  • Secret Key Cryptography
  • Internet Content Filtering Techniques
  • Securing Gadgets
  • Introduction to ISO 27001 & Security Policies
  • Disaster Recovery & Planning
  • Information Technology Amendments Act 2008
  • Case Studies & Hacking News
  • PC Auditing & Virus Analysis
  • Corporate & Economic Espionage
  • Web Application Vulnerabilities
  • Session Hijacking & SQL Injection
  • Phishing & Financial Frauds
  • Security Protocols
  • Linux Hacking
  • Hacking Wireless Networks
  • Exploit Analysis
  • Network & Web Audits
  • Data Acquisition & Forensics Data Recovery
  • Operating System Forensics
  • Cloud Forensics
  • Hacking Mobile Phones, PDA & its Countermeasures
  • Cyber Crime Investigation
  • Cyber Warfare, Terrorism & Social Networking
  • Cyber Forensics and Incident Handling
  • Case Study
  • Group Presentation
  • Sl. No.
  • Chapter
  • Chapter - 1
  • Computers and Cyber Security
  • Chapter - 2
  • Cyber Laws
  • Chapter - 3
  • Introduction to Network Security
  • Chapter -4
  • Virtual Private Network
  • Chapter - 5
  • Network Attacks Part 1
  • Chapter - 6
  • Wireless Attack
  • Chapter - 7
  • Encoding
  • Chapter - 8
  • Web Application Architecture
  • Chapter - 9
  • Cyber Security & Ethical Hacking
  • Chapter - 10
  • Application Attacks
  • Chapter - 11
  • Network Attack
  • Chapter - 12
  • Cyber Security Analysis & Countermeasures
  • Chapter - 13
  • Advance Security Analysis
  • Chapter - 14
  • Indian Information Technology Act
  • Chapter - 15
  • Vulnerabilities & Attacks
  • Chapter - 16
  • Penetrating Testing
  • Chapter - 17
  • Data Acquisition & Forensics
  • Chapter -18
  • Capstone project

Contact Us

Top