Advanced Cyber Security Professional Course by TÜV SÜD in India

Understand the basic concepts associated with Cyber Security and know what your organisation needs to stay secure

Understand the basic concepts associated with Cyber Security and know what your organisation needs to stay secure

virtual classes schedule

16th - 20th May 2022: Advance Course in Cyber Security | Duration: 5 Days | Time: 9:30 am to 6:30 pm

Note: If your preferred training date is not visible, please reach out to us by filling up the form.

About the course

The advanced cyber security course concepts go beyond the topics covered in entry-level security courses. Every organisation is responsible for ensuring Cyber Security. The ability to protect its information systems from impairment or even theft is essential to success. Implementing effective security measures will offer liability protection and increase efficiency and productivity.

This Advanced Cyber Security Professional course will help candidates understand the different types of malware and security breaches and develop effective prevention methods to improve overall security. They will also understand the basic concepts associated with Cyber Security and what a company needs to stay secure. 

your benefits

Cyber security entails programs, technologies, and processes designed to protect networks, computers, and data from attack, damage, and unauthorised access. Cyber security training programs teach professionals to identify vulnerabilities, defend against cyberattacks, and respond to emergencies.

Our cyber security course will give you the following benefits:

  • Learn advanced techniques to support people/organisations to secure their cyber workspaces
  • Gain the requisite skills and knowledge about network security 
  • Become part of the growing Cyber Security fraternity  
  • Get recognition by peers and employers
  • Enhance your employability

COURSE CONTENT/OUTLINE

The advanced cyber security professional training includes the following modules:

  • Introduction to Cyber Security

Cyber security frameworks - MITRE, NIST
CIA triad
Top 10 common attacks

  • OS Security

• Windows CLI (PowerShell)
• PowerShell Scripting
• Linux CLI
• Bash Scripting
• Windows Hardening - Mosse Security automation

  • Cryptography and Encryption 

• Introduction to Cryptography
• Encryption – Writing Basic python script
• Hashing – Introduction to hashing, use of Hash in real world examples, writing bash script for automation
• Encoding – Introduction, use cases

  • Types of Malware
  • Worms, Virus, Spyware, Trojans case studies
  • Web Application Security

Introduction to OWASP
OWASP top 10
Hacking web-application Juice Shop
Setting up local lab Installation of LAMP stack, Config vwa app, Hacking application

  • System Hacking
Hacking into Windows – Using Metasploit Framework, Using PowerShell Empire Framework
C2 [Command and Control Servers] – Covenant C2, Installation & run, Amsi.fail for bypass windows security
  • System Security

• Event logs
• Antivirus / Anti-malware scanning
• SIEM for log detection
• Splunk introduction and basics

  • Advance Exploitation

• Vulnerability scanning
• Active Directory
i. Installation and Configuration
ii. Enumerate users using kerbrute
• Handling Public Exploit
i. ZeroLogon
ii. OMIGOD exploit
iii. Eternalblue
• Privilege Escalation

  • Malware Analysis

• Using online tools 
    i. Hybrid analysis
    ii. Virus total
• Introduction to REMnux
• Using Yara Rules
    i. Introduction to Yara rules
    ii. Using Yara rules
    iii. Config Thor for automated Yara detection
    iv. Writing custom Yara rules.
• Analysis of Malware executable
• Analysis of malware document file

  • Data Breaches

• What is data breach?
• Finding breached data
    i. Pwndb
• Phishing
    i. Introduction
   ii. Setting up lab
   iii. Running a phishing Attack.
• Email spoofing 
   i. How to?
   ii. Send a spoofed email
   iii. Mitigation 

  • Social Security

• Privacy policy
• What google knows about you?
• GDPR
• Using GDPR for requesting data

  • Prevention Software

• Firewall
• VPNs
• SIEM (Splunk) - Installation
• Use of Pub Key Auth with online server

  • Wrapping-up

• Words from the wise
• Lessons learnt
• Q&A

WHO SHOULD ATTEND?

This course can be attended by security officers, auditors, security professionals, website administrators, anyone who is concerned about the security of their network infrastructure and everyone who want to have a promising career in cyber security. 

TRAINING DURATION

60 hrs.

Pre-requisites

• Basic Programming (Python, PHP, MySQL)
• Understanding of Networking protocols & topology
• System Command lines (PowerShell & Bash/ZSH)

examination and Evaluation

Duration: 120 mins MCQ/LAB

Participants will be assessed throughout the course for punctuality, interactive approach, involvement, role-play, and finally through a written examination at the end of the course. The examination is ‘closed book’ 

Cyber security course CERTIFICATION

Get the cyber security professional training certification through our program, exclusively designed for working professionals.

The criterion for TÜV SÜD’s cyber security program certification is to get a minimum 70% score. This makes you eligible to receive the ‘Advanced Security Professional’ training certificate.

Next Steps

Site Selector