cyber security
Job Ready program

₹ 15,000

Join Our Free Master Class Session

Next Cohort Starts: 10 Aug, 2023
Limited no. of seats available

Program Duration: 4-5 Months
At 10-15 hours/week

Online / Classroom
Learning Format

Program Overview

our Cyber Security Job ready Program your gateway to becoming a proficient authority in this most thriving domain. Explore comprehensive approaches to safeguarding infrastructures, securing data and analysing risks and achieve compliance excellence. Prepare to thrive in the dynamic world of cybersecurity.

Key Features

Mastery Curriculum: our cutting-edge curriculum teaches the latest to become a true cyber defender

Career Catalyst: Builds your profile Access Exclusive Job Opportunities

Hands-On Cyber Challenges: ensures you gain practical skills and real-world experience that employers value

Cyber Technology toolset : Master the Latest Defense Tools and Technologies Against Cyber Threats!

Personalised Mentorship: Our mentors will provide personalised support, advice to shape your cyber security career.

Expert-Led Insight Sessions: Learn from Top Industry Visionaries and real-world examples for practical learning

Course Plan

  • Network Security
  • Endpoint Security
  • Application Security
  • Identity Management
  • Cloud Security
  • Mobile Security
  • Data Security
  • Penetration Testing
  • Digital Forensics
  • Malware Analysis
  • Lab :- Kali Linux, Parrot OS, Windows, Various tools based on Concepts..

Introduction to Cyber Security

  • Fundamentals of Cyber Security CIA Triad
  • Cyber Kill Chain
  • Types of Hackers
  • Cyber Threats
  • Case Studies of recent security breaches
  • The evolution of Cybersecurity
  • Cybersecurity & situational awareness
  • The Cybersecurity skills gap
  • Difference between Information Security & Cybersecurity
  • Cybersecurity objectives
  • Cybersecurity Roles
  • Hackers Vs Ethical Hackers
  • Introduction to Kali Linux/Parrot OS
  • Terminologies used in Hacking
  • Foot printing, Information Gathering, Reconnaissance Scanning
  • Spoofing
  • Tools Used :- Parrot OS, Shodan, Ping, Whois,TOR,Psiphon,Netcraft, NMAP,Hping3 etc..
  • NIST Vulnerability Assessment Lifecycle
  • Vulnerability Scanning
  • Nessus, Openvas
  • Research on Vulnerabilities
  • Tools Used :- Nessus, Openvas, NVD
  • Metasploit
  • Vulnerability Exploit of Windows OS
  • Armitage
  • Tools Used :- Metasploit, Armitage
  • DOS & DDOS
  • MITM
  • Tools Used :- Wireshark, Arppoisioning,Hping3,LOIC, Ettercap Graphical
  • Bruteforce Attack
  • Password Spraying
  • Dictionary Attack
  • Demonstration of Windows Password Cracking
  • SSH Bruteforce
  • Application Password Cracking
  • Tools Used :- Responder, Hydra, John the Ripper, Burp Suite
  • Virus, Worm & Malware
  • Types of Malwares
  • Command & Control
  • Research on few Malwares
  • Tools Used :- VirusTotal,Sandbox,Sysinternal tools, Network Commands
  • Types of Social Engineering Attacks
  • Phishing Attacks
  • Phishing EMail analysis.
  • Components of Web Applications
  • OWASP Top 10
  • Web application Scanning
  • Tools Used :- OWASP Zap, SQLmap, Burpsuite etc..
  • Types of Firewalls
  • IDS & IPS
  • Anti-Malware EDR
  • Proxy
  • Load Balancer
  • VPN
  • Security Operations and Management
  • Need of SOC
  • Components of SOC: People, Processes, and Technology
  • Types of SOC Models
  • Tactics-Techniques-Procedures (TTPs)
  • Advanced Persistent Threats (APTs)
  • Understanding Indicators of Compromise (IoCs)
  • SIEM Architecture and Its Components
  • Need of SIEM
  • SIEM Solutions – Splunk & Qradar
  • Splunk Enterprise Security (ES)
  • Splunk installation
  • Splunk universal log forwarding installation Tools Used :- Splunk, Qradar
  • Typical Log Sources
  • Need of Log
  • Typical Log Format
  • Understanding Palo Alto FW logs
  • Understanding DNS logs
  • Understanding HTTP logs
  • Understanding Windows logs
  • Understanding Linux logs
  • Understanding AntiMalware logs
  • Incident Response (IR) Lifecycle
  • Network Security Incidents
  • Application Security Incidents
  • Email Security Incidents
  • Malware Incidents (Detail Malware Analysis)
  • Report Writing
  • Cyber Threat Intelligence
  • Threat Intelligence Sources
  • Threat hunting
  • Infrastructure Terminology
  • Designing with Security in Mind
  • Network Topology
  • OSI Layers & TCP/IP Model
  • IPv4 & IPv6
  • Ports & protocols
  • Port numbers
  • Firewalls
  • VPNs and VPN Concentrators
  • Intrusion Detection Systems
  • Router
  • Switch
  • Proxy
  • Load Balancer
  • Access Point
  • Network Access Control (NAC)
  • Mail Gateway
  • Bridge
  • Threat and Attack Terminology
  • Malware and Crypto-Malware
  • Living in a World of Viruses
  • Symptoms of a Virus Infection
  • How Viruses Work
  • Types of Viruses
  • Managing Spam to Avoid Viruses
  • Antivirus Software
  • Understanding Various Types of Application/Service Attacks
  • Identifying Denial-of-Service and Distributed
  • Denial-of-Service Attacks
  • Man-in-the-Middle Attacks
  • ARP Poisoning
  • Man-in-the-Browser
  • Zero-Day Exploits
  • MAC and IP Spoofing Attacks
  • OWASP TOP 10 (Web Application Attacks)
  • Phishing
  • Ransomware
  • System/platform hardening
  • Modes of operations
  • File system permissions
  • Credentials & privileges
  • Command line knowledge
  • Logging & system monitoring
  • Virtualization
  • Cyber Kill Chain
  • Advance Persistent Threat
  • Vulnerability Assessment
  • Penetration Testing
  • SIEM & Incident Handling
  • Threat Intelligence Tools
  • Threat Hunting
  • Data protection
  • Data acquisition
  • Imaging
  • Extraction
  • Interrogation
  • Ingestion/normalization
  • Reporting
  • Network traffic analysis
  • Log file analysis
  • Time lines
Syllabus
Best-in-class content developed by industry experts

FAQ's

JobPakado offers a wide range of programs in various fields such as business, technology, creative arts, engineering and more. Some of our popular programs include embedded systems, full-stack java development, data science, full-stack Python, AWS, SQL, Android, and iOS development, agile methodologies, web development, and digital marketing.

The duration of our programs varies depending on the field and level of the program. Some of our programs are short-term and can be completed within a few weeks, while others are more comprehensive and can take up to a few months or more to complete.

You will find the option above to view the ongoing programs from the view all programs page. Choose your program from the programs section and register by clicking on start learning followed by successful payment.

We offer our learners a range of support services, including academic advising, tutoring, career services, and counselling services. We are committed one to one chat support system between Learner and Trainer which help will help our learners succeed academically and personally.

Tell us more about your self