Advance Diploma in Cyber Security


Eligibility: Final-year students, freshers from B.Tech, BSc, MCA, BCA
Duration: 4 Months
Job Roles:
  • Security Analyst / Cybersecurity Analyst
  • Network Security Engineer
  • Ethical Hacker / Penetration Tester
  • Incident Response Specialist
  • Vulnerability Assessment Specialist
  • Cybersecurity Consultant
  • Malware Analyst
  • Cybersecurity Architect
Certifiacations: CCNA, CompTIA Security+, Certified Ethical Hacker (CEH)
  • Networking fundamentals, OSI & TCP/IP models
  • IP addressing, subnetting, and network devices
  • ACLs, NAT, VLANs, and routing
  • Network protocols and security practices
  • OSI & TCP/IP Models
  • OSI Model – 7 Layers Explained with Examples
  • TCP/IP Model & Comparison with OSI
  • Importance in Cybersecurity (Layer-wise attacks)
  • IP Addressing & Subnetting
  • IP Address Concepts (IPv4/IPv6)
  • Public vs Private vs Reserved IPs
  • Classless IP Addressing (CIDR)
  • Subnet Masks & Calculations
  • Subnetting of Class A, B, C
  • Network Devices
  • Hub, Switch, Router, Modem, Access Point
  • Managed vs Unmanaged Switches
  • Basic Network Design using Devices
  • Network Security Basics
  • Securing Switches and Routers
  • Network Protocols: HTTP, HTTPS, DNS, FTP, SMTP, Telnet, SSH
  • Role of ACLs (Access Control Lists) in Firewalls and Routers
    • Standard (Basic) ACLs
    • Extended (Advanced) ACLs
  • NAT (Network Address Translation)
  • Why NAT is used
  • Static NAT, Dynamic NAT, PAT (Port Address Translation)
  • NAT in Home vs Enterprise Networks
  • VLANs & Routing
  • VLANs and their Use in Segmentation
  • Access and Trunk Ports
  • Router Configuration Basics
  • Static and Dynamic Routing Overview (RIP, OSPF – Concept Only)
  • Windows Server & Domain Basics
  • Introduction to Windows Server 2019
  • Difference Between Client OS and Domain-based Systems
  • Overview of Active Directory Domain Services (AD DS)
  • Installing and Promoting a Domain Controller
  • Managing AD DS Objects (Users, Computers, Groups, OUs)
  • DNS & DHCP for Security
  • Configuring DNS Zones (AD-Integrated, Primary, Secondary)
  • Understanding DNS Resource Record Types: A, AAAA, NS, SOA, PTR, CNAME
  • Overview of DHCP & DORA Process
  • Configuring DHCP Scope & Reservation
  • Identity & Policy Control
  • Introduction to Group Policy Architecture
  • Local vs Domain Group Policy
  • Group Policy Processing Order – LSDOU
  • Applying Policies for Security (Password Policy, Software Restriction, etc.)
  • File Server Permissions – Share vs NTFS
  • Overview of DFS Namespace and DFS Replication
  • Command Line & Scripting (Intro)
  • AD DS Administration using Command Prompt and PowerShell
  • Common Security Commands: net user, gpresult, Get-EventLog, etc.
  • Security Tools & Monitoring
  • Introduction to Event Viewer – Logs to Monitor
  • Basics of Windows Defender, Firewall, UAC
  • Monitoring with Task Manager, msconfig, and services.msc
  • Linux Fundamentals
  • Introduction to Linux & Common Distributions (Ubuntu, CentOS, Kali)
  • Understanding the Linux Directory Structure
  • Accessing the Command Line (Terminal Basics)
  • File & User Management
  • Creating, Viewing, and Editing Text Files (cat, nano, vi)
  • Managing Files and Directories (cp, mv, rm, mkdir, touch)
  • Linux File Permissions – rwx, chmod, chown, umask
  • Understanding and Setting SUID, SGID, Sticky Bits
  • Administering Users and Groups – adduser, usermod, groupadd, etc.
  • Security & Access Control
  • Configuring and Securing OpenSSH
    • Password vs Key-based Login
    • Disabling Root SSH Login
  • Linux File System Permissions – Protecting Sensitive Data
  • Firewall Basics with ufw / iptables
  • Network Port Security – Checking Open Ports with ss, netstat, nmap
  • Process & Service Management
  • Monitoring Processes – ps, top, htop, kill
  • Managing Services – systemctl, service
  • Scheduled Tasks – Crontab Basics and Abuses
  • Logging & Analysis
  • Understanding Linux Logs (/var/log/)
  • Log Files: auth.log, syslog, dmesg, messages
  • Using journalctl for Event Tracking
  • Hands-on Log Analysis (Find Brute-force Attempts, Sudo Failures, etc.)
  • Linux Networking
  • IP Configuration – ip, ifconfig, nmcli
  • Network Connectivity Tools – ping, traceroute, curl, wget
  • Service & Port Scanning – netstat, ss, nmap
  • Basic tcpdump for Traffic Sniffing (Intro)
  • Package Management
  • Installing, Updating, and Removing Packages – apt, yum, dnf
  • Installing Tools like nmap, htop, tcpdump, netcat
  • Understanding Cybersecurity: Scope & Importance
  • Cybersecurity Terminology
  • Types of Threats & Attacks
  • Security Domains: Network, Web, Endpoint, Cloud
  • Tools Overview
    • ZAP, Nessus, Nmap, VirusTotal, Talos, IPVoid, EDR
  • What is Ethical Hacking?
  • Footprinting and Reconnaissance
  • Techniques for Collecting Information About a Target (Passive and Active)
  • Tools like Shodan, Whois, and Nmap for Discovering Open Ports, Services, and Host Information
  • Netcat for Banner Grabbing and Service Enumeration
  • Scanning and Enumeration
  • Using Nessus Essentials, OpenVAS, and Nmap for Scanning Vulnerabilities and Services
  • Importance of Network Scanning and Identifying Attack Vectors
  • System Hacking
  • Exploiting System Vulnerabilities to Gain Unauthorized Access
  • Using Metasploit for Exploit Development and Netcat for Reverse Shells
  • Privilege Escalation Techniques using Tools like Hydra and Metasploit
  • Malware Threats
  • Common Types of Malware: Viruses, Worms, Trojans, and Ransomware
  • Analyzing Malware with VirusTotal, Hybrid Analysis, and Any.Run
  • Sniffing
  • Sniffing Network Traffic using Tools like Wireshark and tcpdump to Capture and Analyze Data Packets
  • Social Engineering
  • Techniques such as Phishing, Baiting, Pretexting, and Impersonation
  • Using Social-Engineer Toolkit (SET) for Social Engineering Attacks
  • Maltego for Mapping Social Connections and Network Relationships
  • Denial of Service (DoS)
  • Overview of DoS and DDoS Attacks
  • Tools like LOIC (Low Orbit Ion Cannon) and Hping3 for Simulating DoS Attacks
  • Session Hijacking
  • Attacking and Hijacking User Sessions
  • Using Wireshark for Capturing Sessions
  • OWASP Top 10
  • In-depth Look at the Most Common Web Application Vulnerabilities
  • Using OWASP ZAP, DVWA for Testing Common Web Security Flaws
  • Hacking Web Servers and Applications
  • Exploiting Vulnerabilities in Web Servers and Web Applications
  • Practical Hands-on Using OWASP ZAP
  • SQL Injection
  • Introduction to SQL Injection Attacks and How They Exploit Poorly Secured Databases
  • Using SQLmap for Automated SQL Injection Exploitation
  • Cryptography
  • Basic Cryptographic Concepts: Encryption, Decryption, Hashing, and Salting
  • Hands-on with OpenSSL for Implementing Basic Encryption and Decryption Techniques
  • Vulnerability Assessment with Nessus
  • Using Nessus Essentials to Scan for Known Vulnerabilities and Weaknesses in Target Systems
  • Indicators of Compromise (IOC)
  • Hashes, URLs, Domains, IPs
  • Malware Detection & Prevention
  • VirusTotal – File, Hash, and URL Scanning
  • IPVoid – IP Blacklists
  • Talos Intelligence – Advanced IOC Context
  • Endpoint Security & EDR
  • Endpoint Threats and Detection
  • Telemetry, Isolation, and Remediation
  • Policy-based Prevention
  • Tools: SentinelOne (Trial)
  • Incident Response & Reporting
  • IR Process: Preparation to Lessons Learned
  • Vulnerability Lifecycle Documentation
  • Security Reports for Management
  • Tools: Nessus (Vulnerability Reports), ZAP (Web Scan Reports), VirusTotal (Threat IOC Reports)
Final Capstone Project:
  • Choose from Projects
  • Complete Web App Vulnerability Assessment (ZAP)
  • Enterprise Network Scan with Nessus + IOC Reporting (Talos, VirusTotal, IPVoid)

Enquiry