Introduction to Cyber Security | Amar iSchool

Introduction to Cyber Security

The demand for a Cyber Security Specialist is growing day by day. There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! By the end of the course, you will not only learn about cyber security but also you are on the way to becoming a cyber security specialist.

Beginner 0(0 Ratings) 0 Students enrolled
Created by Md. Mudasser Hossain Hedaet Last updated Tue, 08-Jun-2021 Bengali
What will i learn?
  • Secure Lab Setup and Essential Linux system commands.
  • Footprinting & Information Gathering.
  • Website penetration testing.
  • Man in the middle attacks & Social Engineering Attack.
  • System hacking using Metasploit.
  • Password Hacking Using Kali Linux.
  • Buffer Overflow.
  • Keylogger & Spyware.
  • Cryptography.

Curriculum for this course
0 Lessons 00:00:00 Hours
Requirements
  • Linux fundamentals
  • Essential networking terms
  • Essential hacking terms
+ View more
Description


Week
Day
Topic
Week 1
Day 1

● Introduction to the course. 

● Introduction to cyber security. 

● Setting up Environment 

* VirtualBox & VMware installation 

* Kali Linux Installation 

* OWASP Installation



Day 2

● Linux fundamentals. 

● Linux Basic Commands. 


Day 3

● Essential networking terms. 

● Essential hacking terms. 

● Additional Kali tools to install. 

● Changing MAC address.

Week 2
Day 4
● Nmap Basic to Advance.

Day 5
Test 1

Day 6

● HTTP request. 

● HTTP response.

● Burp Suite configuration. 

● Editing packets in Burp Suite.


Week 3
Day 7

● Data Tampering 

● Broken Authentication vulnerability



Day 8

● Sensitive Data Exposure 

● XML vulnerability



Day 9

● Whatweb and Dirb 

● Password recovery attack 

● Burp Suite login Brute Force 

● Hydra login Brute Force


Week 4
Day 10

● Anonymity 

● Tor Network 

● Deep & Dark Web


Week 5
Day 11

● Injection attacks 

● Simple command injection 

● Exploiting command injection 

vulnerability



Day 12
Test 2

Day 13

● Finding blind command injection 

● SQL basics 

● Manual SQL injection



Day 14

● SQLmap basics 

● XML injection 

● Preventing injection attacks



Day 15

● What is XSS 

● Reflected XSS 

● Stored XSS 

● Changing HTML code with XSS 

● Using XSSer


Week 6
Day 16

● Hashcat 

● Crunch 

● Rainbow tables



Day 17
Test 3

Day 18

● ARP protocol basics 

● Man in the middle attack theory 

● Man in the middle attack live 

● Cloning any webpage


Week 7
Day 19

● Ettercap 

● MSFconsole environment 

● Metasploit modules explained



Day 20

● PHP code injection 

● Creating payloads



Day 21
● Cryptography
Week 8
Day 22
Test 4

Day 23
● Python language basic 1

Day 24
● Python language basic 2
Week 9
Day 25
● Backdoor

Day 26
Test 5

Day 27
● Creating a Keylogger for the Backdoor
Week 10
Day 28

● Spyware 

● Denial of service (DoS) attack 

● Buffer overflow



Day 29

● Why is ethical hacking a valuable skill?

● What is the best ethical hacking 

certification? 

● How to price your work?



Day 30
Final Test



Week 1 

Day 1 

● Introduction to the course. 

● Introduction to cyber security. 

● Setting up Environment 

* VirtualBox & VMware installation 

* Kali Linux Installation 

* OWASP Installation


Day 2 

Day 3 

● Linux fundamentals. 

● Linux Basic Commands. 

● Essential networking terms. 

● Essential hacking terms. 

● Additional Kali tools to install. 

● Changing MAC address.

Week 2 

Day 4 

● Nmap Basic to Advance.


Day 5 

Test 1


Day 6 

● HTTP request. 

● HTTP response.





● Burp Suite configuration. 

● Editing packets in Burp Suite.

Week 3 

Day 7 

● Data Tampering 

● Broken Authentication vulnerability


Day 8 

● Sensitive Data Exposure 

● XML vulnerability


Day 9 

● Whatweb and Dirb 

● Password recovery attack 

● Burp Suite login Brute Force 

● Hydra login Brute Force

Week 4 

Day 10 

● Anonymity 

● Tor Network 

● Deep & Dark Web

Week 5 

Day 11 

Day 12 

Day 13 

● Injection attacks 

● Simple command injection 

● Exploiting command injection 

vulnerability 

Test 2 

● Finding blind command injection 

● SQL basics 

● Manual SQL injection


Day 14 

● SQLmap basics 

● XML injection 

● Preventing injection attacks


Day 15 

● What is XSS 

● Reflected XSS 

● Stored XSS 

● Changing HTML code with XSS 

● Using XSSer

Week 6 

Day 16 

● Hashcat 

● Crunch 

● Rainbow tables


Day 17 

Test 3


Day 18 

● ARP protocol basics 

● Man in the middle attack theory 

● Man in the middle attack live 

● Cloning any webpage



Week 7 

Day 19 

● Ettercap 

● MSFconsole environment 

● Metasploit modules explained


Day 20 

● PHP code injection 

● Creating payloads


Day 21 

● Cryptography

Week 8 

Day 22 

Test 4


Day 23 

● Python language basic 1


Day 24 

● Python language basic 2

Week 9 

Day 25 

● Backdoor


Day 26 

Test 5


Day 27 

● Creating a Keylogger for the Backdoor

Week 10 

Day 28 

● Spyware 

● Denial of service (DoS) attack 

● Buffer overflow


Day 29 

Day 30 

● Why is ethical hacking a valuable skill? ● What is the best ethical hacking 

certification? 

● How to price your work? 

Final Test

+ View more
Other related courses
00:00:00 Hours
0 0 ৳6000 ৳4500
00:00:00 Hours
0 0 ৳3500 ৳2000
00:00:00 Hours
Updated Mon, 09-Aug-2021
0 0 ৳7000 ৳5000
About the instructor
  • 0 Reviews
  • 0 Students
  • 1 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
৳2000 ৳5000
Includes:
  • Beginner
  • Live session
  • 0 Lessons
  • Full lifetime access
  • Access on mobile and tv
  • Certificate after completion
  • 24 hours Refund Policy