Cyber Security

Cyber Security

ACETECK provides best Cyber Security

Unlock the power of your data with cutting-edge analytics! Our training equips you with the skills to transform raw data into actionable insights, driving smarter decisions and fostering innovation. Transform complex data into clear insights and actionable strategies to drive success and innovation in your field.

Objectives

  1. Identify the components of a computer network and describetheir basic characteristics
  2. Understand the model of host-to-host communication Describe the features and functions of the Cisco
  3. InternetworkOperating System (IOS®) software
  4. Describe LANs and the role of switches within LANs Describe Ethernet as the network access layer of
    TCP/IP anddescribe the operation of switches
  5. Install a switch and perform the initial configuration Describe the TCP/IP Internet layer, IPv4, its
    addressingscheme, and subnetting
  6. Describe the TCP/IP Transport layer and Application layerExplore functions of routing
  7. Implement basic configuration on a Cisco router
  8. Explain host-to-host communications across switches androuters
  9. Identify and resolve common switched network issues andcommon problems associated with IPv4
    addressing
  10. Describe IPv6 main features and addresses, and configure andverify basic IPv6 connectivity
  11. Describe the operation, benefits, and limitations of staticrouting
  12. Describe, implement, and verify Virtual Local Area Networks(VLANs) and trunks
  13. Describe the application and configuration of inter-VLANrouting
  14. Explain the basics of dynamic routing protocols and describe components and terms of Open Shortest
    Path First (OSPF) Explain how Spanning Tree Protocol (STP) and Rapid SpanningTree Protocol (RSTP)
    work
  1. Configure link aggregation using EtherChannel Describe the purpose of Layer 3 redundancy
    protocols
  2. Describe basic WAN and VPN concepts
  3. Describe the operation of Access Control Lists (ACLs) and theirapplications in the network
  4. Configure Internet access using Dynamic Host ConfigurationProtocol (DHCP) clients and explain and
    configure Network Address Translation (NAT) on Cisco routers
  5. Describe basic Quality of Service (QoS) concepts
  6. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use
    Wireless LANControllers (WLCs)
  7. Describe network and device architectures and introducevirtualization
  8. Introduce the concept of network programmability and Software-Defined Networking (SDN) and describe
    smart network management solutions such as Cisco DNA Center™, Software-Defined Access (SDAccess), and Software Defined Wide Area Network (SD-WAN)
  9. Configure basic IOS system monitoring tools Describe the management of Cisco devices
  10. Describe the current security threat landscapeDescribe threat defense technologies
  11. Implement a basic security configuration of the devicemanagement plane
  12. Implement basic steps to harden network devices
1. Linux essentials for hackers – (How a Hacker setup his machine)
  1. Module 1:- Linux distribution for hacking (Understanding of operating systems).
  2. Module 2:– Ubuntu – Hacker setup and configuration.
  3. Module 3:– Kali Linux and Parrot OS –
    Deployment, configuration real time usage.
  4. Module 4:– Upgrades and Linux defense.

Course Modules:-

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Hacking Web Servers
Module 13: Hacking Web Applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks

Module 1:– hacking with raspberry pi
Module 2:– Wireless network hacking with raspberry pi
Module 3:- Configuring raspberry pi for automated tasks

Module 1- Anonymous Browsing & Tor Network.
Module 2- Anonymous Hosting &
Email services.
Module 3- Hidden Communication platforms & Hidden services.
Module 4- Internet Surveillance.
Module 5- Deep web & Dark web.
Module 6- Bypass Mass surveillance and stay Anonymous.

Module 1:- Introduction to computer forensics
Module 2:- Computer Forensics Investigation Process Labs
Module 3:- Understanding hard disks and file systems
Module 4:- Defeating Anti-forensics Techniques Labs
Module 5:- Operating system Forensics
Module 6:- Network Forensics
Module 7:- Malware Forensics
Module 8:- Mobile Forensics

Module 1 : Security testing in agile world
Module 2 : Penetration Testing Process
Module 3 : Introduction to Web Applications
Module 4 : OWASP TOP 10
Module 5 : Threat modeling
Module 6 : Information Gathering
Module 7 : SQL Injection
Module 8 : SQLi – Filter Evasion and WAF Bypassing
Module 9 : Authentication and Authorization
Module 10 : Cross-Site Scripting & Session Security
Module 11 : Cross-Site Request Forgery
Module 12 : Web Services (APIS)
Module 13 : Report Writing
-Solutions and configurations

Module 1- Tool deployment and configuration
Module 2- Includes EDRs (Theory),
Module 3- SIEM
Module 4- SOC operations (Theory)
Module 5- Security Patch management, Security Patch deployment (Live practical) & automate
patch installation.
Module 6- Security Policy making and implementing.
Module 7- Av servers, Firewalls, IDS, IPS Understanding and monitoring techniques

Module 1:- NextGen Firewall-Firepower Threat Defense (FTD)
– Topic 1- Course Summary and Firepower overview.
– Topic 2-Lab Toplogy
– Topic 3-Installing FMC in VMware Exsi Environment
– Topic 4-Installing FTD in VMware Exsi
– Environment.
– Topic 5-FTD Device registration with FMC.
Topic 2-Firepower Updates.
– Topic 7-Zones and Interface creation.
– Topic 8-Access Control Policy.
– Topic 9-Prefilter Policy.
– Topic 10-IPS Policy.
– Topic 11-Platform Policy.
– Topic 12-NAT Policy.
– Topic 13-URL Filtering.
– Topic 14-Site-to-Site IPSec VPN.
– Topic 15-High-Avaliability Architecture.
– Topic 16-Creation of Domain based management access.
– Topic 17-Intergartion of logs in FMC with SIEM tool using eStreamer.
– Topic 18-Configuration of Alerts/Alarms in FMC.

  • Introduction to BI Tools (Power BI, Tableau, Looker)
    Data Connection and Integration with BI Tools
    Creating Interactive Dashboards
    Sharing Reports and Insights with Stakeholders
  • Critical Thinking and Problem-Solving
  • Communication Skills (Presenting Data Insights)
    Storytelling with Data
  • Working with Cross-Functional Teams