Course details
The Cybersecurity Expert course through SOUTECH Academy will help trainees to stop hackers, terrorists by learning to think like one. This class immerses participants in an interactive environment where they will scan, test, hack, and secure their own systems. Candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, and Virus Creation. All participants will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests and apply it.
Who Should Attend?
- Computer Forensics/Digital Forensics Professionals
- Incident Response Personnel
- Military Personnel
- Information Security Professionals
- IT Managers
- Law Enforcement Personnel
- Legal Professionals
- Network Administrators and Architects
- System Administrators
Module 1: Introduction to Ethical Hacking, Counter Terrorism
- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts, Types, and Phases
- Ethical Hacking Concepts and Scope
- Information Security Controls
- Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting Methodology
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Penetration Testing
Module 3: Scanning Networks
- Overview of Network Scanning
- Scanning Methodology
Module 4: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP Enumeration
- Enumeration Countermeasures
- SMB Enumeration Countermeasures
- Enumeration Pen Testing
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- Hacking Methodology (CHM)
- System Hacking Steps
- Hiding Files
- Covering Tracks
- Penetration Testing
Module 6: Malware Threats
- Introduction to Malware
- Trojan Concepts
- Types of Trojans
- Virus and Worms Concepts
- Malware Reverse Engineering
- Malware Detection
- Countermeasures
- Anti-Malware Software
- Penetration Testing
Module 7: Sniffing
- Sniffing Concepts
- MAC Attacks
- DHCP Attacks
- ARP Poisoning
- Spoofing Attack
- DNS Poisoning
- Sniffing Tools
- Sniffing Tool: Wireshark
- Follow TCP Stream in Wireshark
- Display Filters in Wireshark
- Additional Wireshark Filters
- Sniffing Tool
- Packet Sniffing Tool: Capsa Network Analyzer
- Network Packet Analyzer
- Counter measures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Module 8: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Penetration Testing
Module 9: Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools
- Counter-measures
- DoS/DDoS Protection Tools
- DoS/DDoS Attack Penetration Testing
Module 10: Session Hijacking
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network-level Session Hijacking
- Session Hijacking Tools
- Counter-measures
- Session Hijacking Pen Testing
Module 11: Hacking Webservers
- Webserver Concepts
- Webserver Attacks
- Attack Methodology
- Webserver Attack Tools
- Counter-measures
- Patch Management
- Webserver Security Tools
- Webserver Pen Testing
Module 12: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Web Application Hacking Tools
- Countermeasures
- Security Tools
- Web App Pen Testing
Module 13: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Counter-measures
Module 14: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- WirelessThreats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Counter-measures
- Wireless Security Tools
- Wi-Fi Pen Testing
Module 15: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Hacking Windows Phone OS
- Hacking BlackBerry
- Mobile Device Management (MDM)
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
Module 16: Evading IDS, Firewalls, and Honeypots
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall and Honeypot System
- Evading IDS
- Evading Firewalls
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Counter-measures
- Penetration Testing
Module 17: Cloud Computing
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
Module 18: Cryptography
- Market Survey 2014: The Year of Encryption
- Case Study: Heartbleed
- Case Study: Poodlebleed
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure(PKI)
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Cryptanalysis Tools
Module 19: Application of Ethical Hacking Skills to Nigerian,African,World Cyber Survelliance Drive
- Overview of Skill Set
- Nigerian Terrorism, Groups, Actions, Footprints
- Cyber warfare Strategy Development
- Cyber Interception/ Surveillance Roadmap and Implementation
- Achieving Results and Metrics for Analysis, Reporting and Awareness
About SOUTECH Digital Academy
SOUTECH Web Development Consults – (a smart and budding Information Technology (IT) firm with innovative, intelligent, knowledgeable and experienced consultants, trainers and developers.SOUTECH is primarily an Information Technology Firm which has been in operation for over 10 years, created to be the numero uno in business promotion development & implementation, eBusiness & IT systems integration and consultancy industry of the Nigerian Economy and to partners worldwide.
Our Services and Training Solutions
–Mobile App Development
-Websites, eBusiness & eCommerce Platform Development
-Integrated Online Marketing Solutions
-Web Portals and Application Development
-Alternative Energy Deployment
-Softwares(Antivirus,Windows,Utility)
-eHR and Staff Human Capacity Development
-Research and Technical Documentation
-ComprehensiveTraining & Consulting(iClass, Online, Train the Trainer, Home Kit options available See all SOUTECH Digital Academy courses
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Complete Cyber Security Bootcamp NextGen LearningNGN 390,729Duration: Upto 50 Hours
- Learn Ethical Hacking From A-Z Course CentralNGN 33,971
NGN 205,203Duration: Upto 11 Hours
