

Certification in Cyber Security Professional (CSP)
IT & Software (IT & Software)
Shortlisted by 51+ Students
Location: Bengaluru/Bangalore
Duration: 3 MONTH
Regular / Offline
Average Fees: ₹ 45000
Highlights A Cyber Security Professional course (CSP)course (CSP) is a structured educational program designed to equip individuals with the knowledge, skills, and competencies needed to succeed in the field of cybersecurity. These courses cover a wide range of topics related to cybersecurity, including threat detection and analysis, security architecture, SOC, risk management, incident response, and ethical hacking, among others.
Syllabus
This Course curriculum is a Combination of CYBER SECURITY ELITE (CSEC)+CYBER DEFENCE MASTERY(CDM)
CYBER SECURITY ELITE (CSEC) TOPICS
MODULE 1:Introduction to Ethical Hacking & Cybersecurity
Ethical Hacking Intro Session: How you can be hacked, tools used by hackers, what is ethical about hacking, fundamentals of key issues in the information security world, Qualities of a good hacker, Information security Threats, Elements of Cyber security (CIA Triad), Types of hackers, red team, blue team, phases of pen testing/Phases of hacking, Cyber Kill chain Model.
MODULE 2:Ethical Hacking
Fundamentals Downloading & Installing Vmware workstation. Understanding Kali Linux, Windows VM, Metasploitable, Hackadamics Etc
MODULE 3:Networking Basics
Basics of Networking Goals of Network Security Network Flow Networking Devices Classification of Network Topology Hardware Internet Devices, IPv4 and IPv6 addresses, MAC addresses, network segmentation, NAT, public vs. private networks DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
MODULE 4:Information Gathering Part -1
Footprinting and reconnaissance Intro: Gathering Info, Whois, Netcraft, Footprinting on Social Media, Finding & Footprinting People, Footprinting Financial Info, Footprinting Job Sites, Website Mirroring, Archived Websites, Google ducking, Advanced google search, Advanced Image Search, Reverse Image search.
MODULE 5:Information Gathering Part -2
VM Lab setup. Tracking Emails, Finding IP Address of sender, Fake Email Id (Email Fuzzing), Have I been Pawned, Temporary Emails, Google My Activity, Google Dorks Default Passwords + GHDB
MODULE 6:Network Assessment & Active Network Scanning
Networking Assessment. Active Scanning:proxy + vpn + TOR Gzapper + Browser + macchanger + Smac + Using nmap
MODULE 7:Vulnerability Assessment & Risk Management
Nmap, IP scanner. Vulnerability identification, management, and mitigation, Types of VA, Vulnerability Management Life Cycle, OWSAP Top 10, NVD, CVE, CVSS, Qualys Freescan. Vulnerability vs. risk, ranking risks, approaches to risk management, levels of risk (low, medium, high, extremely high), Natural and human-caused disasters, features of disaster recovery plans (DRP) and business continuity plans (BCP), backup, disaster recovery controls (detective, preventive, and corrective)
MODULE 8:System Hacking
Steganography types, Snow, Hashes, password Cracking Techniques, Dictionary Attacks, Brute Force Attacks, Weak and Strong Passwords. Cracking Passwords, Using Metasploit, Hacking into Linux/windows.
MODULE 9:Malware Attacks
Malware, Virus and Worms, Virus and Trojans, Ransomwares, Zombies and Botnets, Rootkits, Backdoors and Logic bombs, Keylogger, Spyware and Bloatware, Malware attack Techniques, Indications of a Malware Attack. Creating Viruses \Using Currport to detect HTTP RAT.
MODULE 10 :Social Engineering
Social engineering concepts and techniques, Social Engineering toolkit, Tools(zphisher, camhacker,..etc) tailgating, spear phishing, phishing, vishing, smishing Attacks, Insider Threat, Impersonation on social networking sites, Identity Theft, Social Engineering countermeasure's
MODULE 11:DOS and DDOS, Session Hijacking, Sniffing
Understanding DOS & DDOS, Using hping3, using DOSHTTP, Using HOIC, LOIC
MODULE 12:OWASP Top 10 Top 10
Web Application Security Risks, Application security tools and standards, A01:2021-Broken Access Control, A02:2021-Cryptographic Failures, A03:2021-Injection, A04:2021-Insecure Design, A05:2021-Security Misconfiguration, A06:2021-Vulnerable and Outdated Components, A07:2021-Identification and Authentication Failures, A08:2021- Software and Data Integrity Failures, A09:2021-Security Logging and Monitoring Failures, A10:2021-Server-Side Request Forgery
MODULE 13 :Wifi Hacking
Wireless concept, wireless Encryptions, Wireless hacking methods, Wireless hacking tools, bluetooth hacking, countermeasures
MODULE 14:Hacking Mobile Platforms
Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
MODULE 15:Firewalls, IDS & IPS
Firewall Types of Firewall Application of Firewall Introduction to IDS and IPS Types of IDS Types of IPS Difference Between IDS and IPS
MODULE 16:Application and Web Security
WAF Application of WAF Introduction to Proxy and EDR Application of Proxy and EDR IDAM (Identity and Access Management) Password Protection & Identity Theft Counter Measures and Patch Management
MODULE 17:Cyber Crisis Management and Report writing
Introduction to Cyber crisis management, Crafting a Robust Cyber Crisis Management Plan, Different approach to write a report
MODULE 18:Governance and complaints
Governance and Complaints, Governance and Structure Policies, Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app distribution, configuration management), Standards and Procedures, Governance Considerations Compliances, Non-Compliances Consequences
MODULE 19:Identity and Access Management (IAM) Solutions
Identity and Access Management (IAM) Solutions, Identity and Access Management (IAM), Multifactor Authentication, Password Security, Password Attacks, Single Sign-on Federation, Privileged Access Management (PAM), Access Control Models, Assigning Permissions
MODULE 20:Cryptography
Cryptography concept's, Hashing, Encoding and Decoding Types of Cryptography, Types of encryption, hashing, certificates, public key infrastructure (PKI); strong vs. weak encryption algorithms; states of data and appropriate encryption (data in transit, data at rest, data in use); protocols that use encryption
MODULE 21:IoT and OT Hacking
Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.
MODULE 22:Cloud Computing
Different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools
CYBER DEFENCE MASTERY(CDM) TOPICS
Module 01: Introduction to Security Operations Center (SOC)
Module 02: Fundamentals of Cybersecurity
Module 03: Network Security Fundamentals
Module 04:TCP/IP protocols and security protocols
Module 05: Information and Event Management (SIEM) Introduction
Module 06: Security Tools and Technologies Overview
Module 07: Log Management and Analysis
Module 08: Event analysis
Module 09 :Types of alert analysis from SIEM too
Module 10 : EDR tools and fundamentals
Module 11: EDR overview
Module 12: MITRE attack framework
Module 13: Vulnerabilities and the top 10 list
Module 14 : Incident response and its steps
Module 15 Incident handling
Module 16: Cloud basics
Module 17: Cloud Security Fundamentals
Module 18: Security Tools and Technologies Overview
Module 19: Malware analysis
Module 20: Ransomware incident mitigation
Module 21: SOC analyst interview preparation
Module 22 :SOc analyst interview questions
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Discover courses, internships, and jobs that sync with your goals.
Get access to premium features and connect directly with experts. You're all set!
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.