Advance Diploma in Cyber Security
Eligibility: Final-year students, freshers from B.Tech, BSc, MCA, BCA
Duration: 4 Months
Job Roles:
- Security Analyst / Cybersecurity Analyst
- Network Security Engineer
- Ethical Hacker / Penetration Tester
- Incident Response Specialist
- Vulnerability Assessment Specialist
- Cybersecurity Consultant
- Malware Analyst
- Cybersecurity Architect
Certifiacations: CCNA, CompTIA Security+, Certified Ethical Hacker (CEH)
- Networking fundamentals, OSI & TCP/IP models
- IP addressing, subnetting, and network devices
- ACLs, NAT, VLANs, and routing
- Network protocols and security practices
- OSI & TCP/IP Models
- OSI Model – 7 Layers Explained with Examples
- TCP/IP Model & Comparison with OSI
- Importance in Cybersecurity (Layer-wise attacks)
- IP Addressing & Subnetting
- IP Address Concepts (IPv4/IPv6)
- Public vs Private vs Reserved IPs
- Classless IP Addressing (CIDR)
- Subnet Masks & Calculations
- Subnetting of Class A, B, C
- Network Devices
- Hub, Switch, Router, Modem, Access Point
- Managed vs Unmanaged Switches
- Basic Network Design using Devices
- Network Security Basics
- Securing Switches and Routers
- Network Protocols: HTTP, HTTPS, DNS, FTP, SMTP, Telnet, SSH
- Role of ACLs (Access Control Lists) in Firewalls and Routers
- Standard (Basic) ACLs
- Extended (Advanced) ACLs
- NAT (Network Address Translation)
- Why NAT is used
- Static NAT, Dynamic NAT, PAT (Port Address Translation)
- NAT in Home vs Enterprise Networks
- VLANs & Routing
- VLANs and their Use in Segmentation
- Access and Trunk Ports
- Router Configuration Basics
- Static and Dynamic Routing Overview (RIP, OSPF – Concept Only)
- Windows Server & Domain Basics
- Introduction to Windows Server 2019
- Difference Between Client OS and Domain-based Systems
- Overview of Active Directory Domain Services (AD DS)
- Installing and Promoting a Domain Controller
- Managing AD DS Objects (Users, Computers, Groups, OUs)
- DNS & DHCP for Security
- Configuring DNS Zones (AD-Integrated, Primary, Secondary)
- Understanding DNS Resource Record Types: A, AAAA, NS, SOA, PTR, CNAME
- Overview of DHCP & DORA Process
- Configuring DHCP Scope & Reservation
- Identity & Policy Control
- Introduction to Group Policy Architecture
- Local vs Domain Group Policy
- Group Policy Processing Order – LSDOU
- Applying Policies for Security (Password Policy, Software Restriction, etc.)
- File Server Permissions – Share vs NTFS
- Overview of DFS Namespace and DFS Replication
- Command Line & Scripting (Intro)
- AD DS Administration using Command Prompt and PowerShell
- Common Security Commands: net user, gpresult, Get-EventLog, etc.
- Security Tools & Monitoring
- Introduction to Event Viewer – Logs to Monitor
- Basics of Windows Defender, Firewall, UAC
- Monitoring with Task Manager, msconfig, and services.msc
- Linux Fundamentals
- Introduction to Linux & Common Distributions (Ubuntu, CentOS, Kali)
- Understanding the Linux Directory Structure
- Accessing the Command Line (Terminal Basics)
- File & User Management
- Creating, Viewing, and Editing Text Files (cat, nano, vi)
- Managing Files and Directories (cp, mv, rm, mkdir, touch)
- Linux File Permissions – rwx, chmod, chown, umask
- Understanding and Setting SUID, SGID, Sticky Bits
- Administering Users and Groups – adduser, usermod, groupadd, etc.
- Security & Access Control
- Configuring and Securing OpenSSH
- Password vs Key-based Login
- Disabling Root SSH Login
- Linux File System Permissions – Protecting Sensitive Data
- Firewall Basics with ufw / iptables
- Network Port Security – Checking Open Ports with ss, netstat, nmap
- Process & Service Management
- Monitoring Processes – ps, top, htop, kill
- Managing Services – systemctl, service
- Scheduled Tasks – Crontab Basics and Abuses
- Logging & Analysis
- Understanding Linux Logs (/var/log/)
- Log Files: auth.log, syslog, dmesg, messages
- Using journalctl for Event Tracking
- Hands-on Log Analysis (Find Brute-force Attempts, Sudo Failures, etc.)
- Linux Networking
- IP Configuration –
ip, ifconfig, nmcli
- Network Connectivity Tools –
ping, traceroute, curl, wget
- Service & Port Scanning –
netstat, ss, nmap
- Basic tcpdump for Traffic Sniffing (Intro)
- Package Management
- Installing, Updating, and Removing Packages –
apt, yum, dnf
- Installing Tools like
nmap, htop, tcpdump, netcat
- Understanding Cybersecurity: Scope & Importance
- Cybersecurity Terminology
- Types of Threats & Attacks
- Security Domains: Network, Web, Endpoint, Cloud
- Tools Overview
- ZAP, Nessus, Nmap, VirusTotal, Talos, IPVoid, EDR
- What is Ethical Hacking?
- Footprinting and Reconnaissance
- Techniques for Collecting Information About a Target (Passive and Active)
- Tools like Shodan, Whois, and Nmap for Discovering Open Ports, Services, and Host Information
- Netcat for Banner Grabbing and Service Enumeration
- Scanning and Enumeration
- Using Nessus Essentials, OpenVAS, and Nmap for Scanning Vulnerabilities and Services
- Importance of Network Scanning and Identifying Attack Vectors
- System Hacking
- Exploiting System Vulnerabilities to Gain Unauthorized Access
- Using Metasploit for Exploit Development and Netcat for Reverse Shells
- Privilege Escalation Techniques using Tools like Hydra and Metasploit
- Malware Threats
- Common Types of Malware: Viruses, Worms, Trojans, and Ransomware
- Analyzing Malware with VirusTotal, Hybrid Analysis, and Any.Run
- Sniffing
- Sniffing Network Traffic using Tools like Wireshark and tcpdump to Capture and Analyze Data Packets
- Social Engineering
- Techniques such as Phishing, Baiting, Pretexting, and Impersonation
- Using Social-Engineer Toolkit (SET) for Social Engineering Attacks
- Maltego for Mapping Social Connections and Network Relationships
- Denial of Service (DoS)
- Overview of DoS and DDoS Attacks
- Tools like LOIC (Low Orbit Ion Cannon) and Hping3 for Simulating DoS Attacks
- Session Hijacking
- Attacking and Hijacking User Sessions
- Using Wireshark for Capturing Sessions
- OWASP Top 10
- In-depth Look at the Most Common Web Application Vulnerabilities
- Using OWASP ZAP, DVWA for Testing Common Web Security Flaws
- Hacking Web Servers and Applications
- Exploiting Vulnerabilities in Web Servers and Web Applications
- Practical Hands-on Using OWASP ZAP
- SQL Injection
- Introduction to SQL Injection Attacks and How They Exploit Poorly Secured Databases
- Using SQLmap for Automated SQL Injection Exploitation
- Cryptography
- Basic Cryptographic Concepts: Encryption, Decryption, Hashing, and Salting
- Hands-on with OpenSSL for Implementing Basic Encryption and Decryption Techniques
- Vulnerability Assessment with Nessus
- Using Nessus Essentials to Scan for Known Vulnerabilities and Weaknesses in Target Systems
- Indicators of Compromise (IOC)
- Hashes, URLs, Domains, IPs
- Malware Detection & Prevention
- VirusTotal – File, Hash, and URL Scanning
- IPVoid – IP Blacklists
- Talos Intelligence – Advanced IOC Context
- Endpoint Security & EDR
- Endpoint Threats and Detection
- Telemetry, Isolation, and Remediation
- Policy-based Prevention
- Tools: SentinelOne (Trial)
- Incident Response & Reporting
- IR Process: Preparation to Lessons Learned
- Vulnerability Lifecycle Documentation
- Security Reports for Management
- Tools: Nessus (Vulnerability Reports), ZAP (Web Scan Reports), VirusTotal (Threat IOC Reports)
Final Capstone Project:
- Choose from Projects
- Complete Web App Vulnerability Assessment (ZAP)
- Enterprise Network Scan with Nessus + IOC Reporting (Talos, VirusTotal, IPVoid)