Cyber

Security

yes I'm interested

Linux

Module 1: – Introduction to Linux

Describe and define open source, Linux distributions

Module 2: – Linux files systems

understanding the Linux filesystem hierarchy

Module 3: – first interaction with command line

Log into a Linux system and run simple commands using the shell

Module 4: – Manage files from the command line

Copy, move, create, delete, and organize files while working from the bash Shell

Module 5: – Get help in Linux

Resolve problems by using local help systems like help page and man pages

Module 6: – Create, view, and edit text files

Manage text files from command output or in a text editor

Module 7: – Manage local users and groups

Create, manage, and delete local users and groups, as well as administer local password policies

Module 8: – Control access to files

Set Linux file system permissions on files and interpret the security effects of different permission settings

Module 9: – Monitor and manage Linux processes

Evaluate and control processes running on a Red Hat Enterprise Linux system

Module 10: – Control services and daemons

Control and monitor network services and system daemons using system

Module 11: – Configure and secure SSH

Configure secure command line service on remote systems, using Open SSH

Module 12: – Analyze and store logs

Locate and accurately interpret logs of system events for troubleshooting Purposes

Module 13: – Manage networking

Configure network interfaces and settings on Red Hat Enterprise Linux servers

Module 14: – Archive and transfer files

Archive and copy files from one system to another

Module 15: – Install and update software

Download, install, update, and manage software packages from Linux package repositories

Certified Ethical hacking

Module1: – Introduction to Ethical Hacking

Module2: – Footprinting and Reconnaissance

Module3: – Scanning Networks

Module4: – Enumeration

Module5: – Vulnerability Analysis

Module6: – System Hacking

Module7: – Malware Threats

Module8: – Sniffing (MITM)

Module9: – Social Engineering

Module10: – Denial of Service

Module11: – Session Hijacking

Module12: – Evading IDS, Firewalls, and Honeypots

Module13: – Hacking Web Servers

Module14: – Hacking Web Applications

Module15: – SQL Injection

Module16: – Hacking Wireless Networks

Module17: – Hacking Mobile Platforms

Module18: – Hacking IoT and OT Hacking

Module19: – Cloud Computing

Module20: – Cryptography

Advance penetration testing

Module1: – introduction

Module2: – information gathring

Module3: – scanning

Module4: – automated tools

Module5: – buffer overflow

Module6: – password cracking

Module7: – windows privilege escalation

Module8: – linux privilege escalation

Module9: – powershell empire

Module10: – 15 ctf’s

Module11: – Bash scripting

Module12: – firewall evasion

Module13: – antivirus evasion

Module14: – manual tools

Module15: – report writing

Web penetration testing

Module1: – introduction

Module2: web technologies

Module3: – web recon & important tools

Module4: – burpsuit

Module5: – owasp top 10 vuln

Module6: – csrf

Module7: ssrf

Module8: – sql injection

Module9:- jwt token attack

Module10: – 15 ctf’s

Module11: – broken acess control

Module12: – clickjacking

Module13: Server-side template injection

Module14: – manual tools

Module15: – report writing