Cyber

Security
yes I'm interested
Linux
Module 1: – Introduction to Linux
Describe and define open source, Linux distributions
Module 2: – Linux files systems
understanding the Linux filesystem hierarchy
Module 3: – first interaction with command line
Log into a Linux system and run simple commands using the shell
Module 4: – Manage files from the command line
Copy, move, create, delete, and organize files while working from the bash Shell
Module 5: – Get help in Linux
Resolve problems by using local help systems like help page and man pages
Module 6: – Create, view, and edit text files
Manage text files from command output or in a text editor
Module 7: – Manage local users and groups
Create, manage, and delete local users and groups, as well as administer local password policies
Module 8: – Control access to files
Set Linux file system permissions on files and interpret the security effects of different permission settings
Module 9: – Monitor and manage Linux processes
Evaluate and control processes running on a Red Hat Enterprise Linux system
Module 10: – Control services and daemons
Control and monitor network services and system daemons using system
Module 11: – Configure and secure SSH
Configure secure command line service on remote systems, using Open SSH
Module 12: – Analyze and store logs
Locate and accurately interpret logs of system events for troubleshooting Purposes
Module 13: – Manage networking
Configure network interfaces and settings on Red Hat Enterprise Linux servers
Module 14: – Archive and transfer files
Archive and copy files from one system to another
Module 15: – Install and update software
Download, install, update, and manage software packages from Linux package repositories
Certified Ethical hacking
Module1: – Introduction to Ethical Hacking
Module2: – Footprinting and Reconnaissance
Module3: – Scanning Networks
Module4: – Enumeration
Module5: – Vulnerability Analysis
Module6: – System Hacking
Module7: – Malware Threats
Module8: – Sniffing (MITM)
Module9: – Social Engineering
Module10: – Denial of Service
Module11: – Session Hijacking
Module12: – Evading IDS, Firewalls, and Honeypots
Module13: – Hacking Web Servers
Module14: – Hacking Web Applications
Module15: – SQL Injection
Module16: – Hacking Wireless Networks
Module17: – Hacking Mobile Platforms
Module18: – Hacking IoT and OT Hacking
Module19: – Cloud Computing
Module20: – Cryptography
Advance penetration testing
Module1: – introduction
Module2: – information gathring
Module3: – scanning
Module4: – automated tools
Module5: – buffer overflow
Module6: – password cracking
Module7: – windows privilege escalation
Module8: – linux privilege escalation
Module9: – powershell empire
Module10: – 15 ctf’s
Module11: – Bash scripting
Module12: – firewall evasion
Module13: – antivirus evasion
Module14: – manual tools
Module15: – report writing
Web penetration testing
Module1: – introduction
Module2: web technologies
Module3: – web recon & important tools
Module4: – burpsuit
Module5: – owasp top 10 vuln
Module6: – csrf
Module7: ssrf
Module8: – sql injection
Module9:- jwt token attack
Module10: – 15 ctf’s
Module11: – broken acess control
Module12: – clickjacking
Module13: Server-side template injection
Module14: – manual tools
Module15: – report writing