About This Course:
Embark on a transformative journey with EncrypticSecurity's Masters in Cyber Security program, designed to equip candidates with comprehensive skills and expertise in the dynamic field of cybersecurity. Throughout the 12-month course, participants will delve into 11 carefully curated levels, ensuring a thorough understanding of essential concepts and advanced practices.
Secure your future in cybersecurity with EncrypticSecurity's Masters program – where knowledge meets application, and professionals are forged to meet the challenges of a cyber-centric world.
Module
11 Module
12 months
CCNA Cisco Certificate
NETWORK FUNDAMENTALS
- Explain the role and function of network components
- Describe characteristics of network topology architectures
- Compare physical interface and cabling types
- Identify interface and cable issues (collisions, errors, mismatch duplex, and/or speed)
- Compare TCP to UDP
- Configure and verify IPv4 addressing and subnetting
- Describe the need for private IPv4 addressing
- Configure and verify IPv6 addressing and prefix
- Describe IPv6 address types
- Verify IP parameters for Client OS (Windows, Mac OS, Linux)
- Describe wireless principles
- Explain virtualization fundamentals (server virtualization, containers, and VRFs)
- Describe switching concepts
NETWORK ACCESS
- Configure and verify VLANs (normal range) spanning multiple switches
- Configure and verify interswitch connectivity
- Configure and verify Layer 2 discovery protocols (Cisco Discovery Protocol and LLDP)
- Configure and verify (Layer 2/Layer 3) EtherChannel (LACP)
- Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify basic operations
- Compare Cisco Wireless Architectures and AP modes
- Describe physical infrastructure connections of WLAN components (AP,WLC, access/trunk ports, and LAG)
- Describe AP and WLC management access connections (Telnet, SSH, HTTP,HTTPS, console, and TACACS+/RADIUS)
- Configure the components of a wireless LAN access for client connectivity using GUI only such as WLAN creation, security settings, QoS profiles, and advanced WLAN Settings
IP CONNECTIVITY
- Interpret the components of routing table
- Determine how a router makes a forwarding decision by default
- Configure and verify IPv4 and IPv6 static routing
- Configure and verify single area OSPFv2
- Describe the purpose, functions, and concepts of first hop redundancy protocols
IP SERVICES
- Configure and verify inside source NAT using static and pools
- Configure and verify NTP operating in a client and server mode
- Explain the role of DHCP and DNS within the network
- Explain the function of SNMP in network operations
- Describe the use of syslog features including facilities and levels
- Configure and verify DHCP client and relay
- Explain the forwarding per-hop behavior (PHB) for QoS such as classification, marking, queuing, congestion, policing, shaping
- Configure network devices for remote access using SSH
- Describe the capabilities and function of TFTP/FTP in the network
SECURITY FUNDAMENTALS
- Define key security concepts (threats, vulnerabilities, exploits, and mitigation techniques)
- Describe security program elements (user awareness, training, and physical access control)
- Configure and verify device access control using local passwords
- Describe security password policies elements, such as management, complexity, and password alternatives (multifactor authentication, certificates, and biometrics)
- Describe IPsec remote access and site-to-site VPNs
- Configure and verify access control lists
- Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and port security)
- Differentiate authentication, authorization, and accounting concepts
- Describe wireless security protocols (WPA, WPA2, and WPA3)
- Configure WLAN using WPA2 PSK using the GUI
AUTOMATION & PROGRAMMABILITY
- Explain how automation impacts network management
- Compare traditional networks with controller-based networking
- Describe controller-based and software defined architectures (overlay, underlay, and fabric)
- Compare traditional campus device management with Cisco DNA Center enabled device management
- Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
- Recognize the capabilities of configuration management mechanisms Puppet, Chef, and Ansible
- Interpret JSON encoded data
CEH V12 CERTIFICATE / OSCP PEN 200
- Introduction to Ethical Hacking
- Foot Printing & Reconnaissance
- Scanning Network
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewall & Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injections
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IOT Hacking
- Cloud Computing
- Cryptography
PENETRATION TESTING
- Introduction to Penetration Testing
- Web Application Introduction & API
- Session & Cookies
- PHP Programming Basics
- Cross Site Scripting Attacks: Manual
- Indepth Advance SQL Injections
- Cross Site Request Forgery in Depth
- Host Header Injection
- Hacking Web Server with Metasploit
- Brute Forcing Web App/No Rate Limit
- Server Side Request Forgery
- Subdomain Taker Over
- Writing Report Reporting Bugs
- Web Password Poisoning on Reset Function
- Privilege Escalation Injection
- Vertical
- Horizontal
- Remote Code Execution
- Directory Traversal
CERTIFIED SOC ANALYST
- Security Operations and Management
- Understanding Cyber Threats, IoCs, and Attack Methodology
- Incidents, Events, and Logging
- Incident Detection with Security Information and Event Management (SIEM)
- Enhanced Incident Detection with Threat Intelligence
- Incident Response
PALO ALTO PCNSA
Device Management and Services
- Demonstrate knowledge of firewall management interfaces
- Provision local administrators
- Assign role-based authentication
- Maintain firewall configurations
- Push policy updates to Panorama-managed firewalls
- Schedule and install dynamic updates
- Create and apply security zones to policies
- Identify and configure firewall interfaces
- Maintain and enhance the configuration of a virtual or logical router
Managing Objects
- Create and maintain address and address group objects
- Create and maintain services and service groups
- Create and maintain external dynamic lists
- Configure and maintain application filters and application groups
Policy Evaluation and Management
- Develop the appropriate application-based Security policy
- Differentiate specific security rule types
- Configure Security policy match conditions, actions, and logging options
- Identify and implement proper NAT policies
- Optimize Security policies using appropriate tools
Securing Traffic
- Compare and contrast different types of Security profiles
- Create, modify, add, and apply the appropriate Security profiles and groups
- Differentiate between Security profile actions
- Use information available in logs
- Enable DNS Security to control traffic based on domains
- Create and deploy URL-filtering-based controls
- Differentiate between group mapping and IP-to-user mapping within policies and logs
MOBILE PENETRATION TESTING
- Introduction to Android Penetration’s Testing
- Preparing Kali Linux and Genymotion
- Using ADB & Installing Apps
- Decompiling Android Applcation
- Dex File Analysis
- Capturing Android Traffic
- Insecure Logging
- Hardcoding Issues Part - 1
- Insecure Data Storage Part - 1
- Insecure Data Storage Part - 2
- Insecure Data Storage Part - 3
- Insecure Data Storage Part - 4
- Input Validation Issue Part - 1
- Input Validation Issue Part - 2
- Access Control Issue Part - 1
- Access Control Issue Part - 3
- Hardcoding Issues Part - 2
- Input Validation Issue Part - 3
- SSL Pinning Bypass
- IOS Pen Testing
API PEN TESTING
- Introduction to What is an API ?
- Interacting with APIs
- Types of APIs
- API Security
- Lab Setup
- Tool Installation
- Burp Suite Introduction
- Postman Introduction
- Docker Introduction
- Enumerating APIs
- Introduction to Enumeration
- Fuzzing APIs
- Discovery via Source Code
- Attacking Authorization
- Introduction to Authorization
- BOLA Lab
- BFLA Labs
- Challenge solution
- Attacking Authentication
- Introduction to Authentication
- Attacking Tokens
- JSON Web Tokens - Part - 1 Theory JSON Web Tokens - Part - 2 JWTS
- JSON Web Tokens - Part - 3 JWT Tools
- Introduction to Injection Attacks
- Introduction to SQL Injections
- Mid - Course Capstone
- Mass Management
AWS CLOUD SECURITY
- Security Fundamentals
- Cloud Security Principles and Framework
- Identify and Access Management
- Detective Controls
- Infrastructure Protection
- Data Protection
- Incident Response
- Security Automation
- Security Troubleshooting on AWS
- Creating Your Security Journey in AWS
CERTIFIED HACKING FORENSICS INVESTIGATOR
- Computer Forensics in Today’s World
- Computer Forensics Investigation Process
- Understanding Hard Disks and File Systems
- Data Acquisition and Duplication
- Defeating Anti-Forensics Techniques
- Windows Forensics
- Linux and Mac Forensics
- Network Forensics
- Investigating Web Attacks
- Dark Web Forensics
- Database Forensics
- Cloud Forensics
- Investigating EmailCrimes
- Malware Forensics
- Mobile Forensics
- IoT Forensics
EXPLOIT DEVELOPMENT
- Programming & Basics
- Assemble Language
- Debugging
- Stack Based Buffer Overflow
- Understanding windows Shellcode
- Heap Based Overflow
- Exploiting Safe SEH Protected Programs
- Bypassing DEP & ASLR
- Advance Shell - Coding
- Encoders & Writing Custom Encoders
- DLL Hijacking
- Client Side Exploits
- From Vulnerability to Exploit
- Metasploit Framework
- Binary Payloads & Antivirus Evasion
- Exploit to Metasploit
- IDOR (Insecure Direct Object Reference)
- OS Command injection
- Response Manipulation
- Host Header Injection
- Parameter Tampering
- XXE (XML External Entity)
- RCE (Remote Code Execution)
- Introduction to Bug Bounty Platforms
CERTIFIED BUG BOUNTY HUNTER
- About Cyber Security Industry
- Setting up Hacking Machine
- Introduction to Networking
- Web Application Fundamentals & Configurations
- Introduction to Web Application Security Testing
- Web Application Reconnaissance
- Working with Burp suite
- Exploiting Traditional Web Application Vulnerabilities
- Introduction to Session Managements
- Introduction to XSS (Cross-Site Scripting)
- Introduction to SQL injection
- Introduction to File Inclusion Vulnerability
- CSRF (Cross-Site Request Forgery Attack)
- SSRF (Server-Side Request Forgery Attack)