Truephers Certified Cyber Security Analyst Course Certification
40 Hours of Summer Training’s Course Content
Each module contains subtopics in it, expand to see. The Time duration for this course is 1 months.
Truephers offers 40 hours of comprehensive entry-level Ethical Hacking, Cyber Security summer training course at Chandigarh, Mohali. Truephers make learning simpler by focusing more on practical than theoretical. There is no prerequisite for this course and there is no limitation to the person, who can join this course. You may be a teen, a school going kid, a college student, an employee in any public-private sector, a technology lover, or a freelancer, who wants to acquire basics and practicals of cybersecurity and ethical hacking at Chandigarh. We at Truephers impart students learning with the latest tools and most of the time is given to the practicals. In Truphers Certified Cyber Security Analyst (Level 1), we teach students the basics of Networking, Unix/Linux including all the basic to medium level of ethical hacking and penetration testing.
Course Content
Basics of Networking
- Introduction to Internet Protocol
- IP Addresses
- IP Address Spoofing (Changing IP Address)
- Proxies
- Tor Browser, Web proxies, Manual proxies, VPN
- Ports (Logical ports)
- TCP/UDP
- 3-way TCP handshake
- DNS
- DHCP
- SMTP, POP3, IMPS
- HTTP, HTTPS, SSL, TLS
- MAC Address (Hardware Address)
- MAC Address Spoofing
- Hubs and Switches
Digital Forensics
- Introduction to Data Forensics
- Data recovering
- Permanent Data deletion
- Windows Forensics
- Events and Logs views
- USB and Browser Forensics
Cryptography and Steganography
- Disk Encryption
- Image Steganography
- Audio/ Video Steganography
Virtual Machines (VMWare, Virtual Box, KVM)
- Introduction to Virtual Machines.
- Installation of Virtual Box, VMWare, KVM’s
- Configuration of Virtual Machines in details
- Networking in Virtual Machines
Basics of Linux Administration
- Introduction to UNIX/ LINUX
- Downloading and Installing Linux
- File Structure
- Basics Commands
Kali Linux
- Introduction to Kali Linux
- Installing and Updating Kali Linux
- Kali Linux File Structure
- Netcat
Viruses, Worms, Trojans, Binder’s and Crypter’s
- Virus creation
- Trojan/RAT creation
- NetBus
- Poison Ivy, Cybergate RAT
- Binders
- Crypters
Sniffing and Security
- Wired Sniffing and Wireless Sniffing
- ARP Poisoning
- Wireshark
- Cain and Able
- SSL-strip
ATM Hacking
- ATM Hacking and Techniques
- Card cloning
- Skimmers
- Online Frauds
Active Information Gathering/ Enumeration
- Active Information Gathering
- OS Fingerprinting
- Port Scanning
- Banner Grabbing.
- Different Port Scanning tools and types.
- Port Scanning with Nmap
- Nmap Scripting Engine
- Zenmap
Passive Information Gathering/ Enumeration
- Passive Information Gathering
- Google Hacking Database/ Google Dorks
- Netcraft – Web Server Information Gathering
- Wayback Machine
- Domain Name WHOIS lookup
- Reverse hostname lookup
Wireless Hacking and Security
- Wireless USB adapters
- Monitor mode and Promiscuous mode
- WEP Encryption
- WEP Password Cracking
- WPA/ WPA2 Password Cracking
- WPS Cracking
- Using other graphical tools
Web Application Penetration Testing
- Basics of Web
- Understanding Web Protocols
- Configuring Vulnerable Web Application for Learning and Testing
- Burp-Suite
- SQLmap
- Cross-Site Scripting XSS
- SQL Injection and Broken Authentications
- Insecure File Uploads
- And Mitigations of all of the above
Metasploit Framework
- Installing or updating
- User Interfaces
- Exploring Auxiliary module
- Exploring Exploit module
- Metasploit Payload module
- Searchsploit Exploit-DB
- Staged vs. Non-staged payloads
- Meterpreter
Miscellanies
- Making Bootable Pen-drive
- GNS3
- USB Password Sniffing APK
Google Hacking Database
- Using Google Dorks
- Finding files, pages for particular Website
- Finding Open Cameras
- Finding Routers
- Exploit-DB GHDB
- SHODAN (Search Engine for IoT)
DOS Attacks
- SMURF DOS
- Ping of Death DOS
- DDOS
System Hacking and Security
- Windows password hashing
- Windows SAM Database
- Windows Password Cracking
- Brute-forcing
- Rainbow tables
- Ophcrack
- Cain and Able
- bkhive, samdump2
- Password Hashing and Encryption
- John The Ripper
Why Truephers’ Training
Goodies Takeaway
Our Students’ Reviews
Frequently asked Questions
This course is for those who at least have the knowledge of how to operate a Windows or MAC or Linux operating system and can read and understand the English articles and also listen and understand video tutorials and lectures available in English. The preferred time for joining this course is after your 10th standard and till you want, no upper age or limit for anything.
This course teaches you the basics of fundamental things like networking, operating systems, applications, and ethical hacking to the intermediary things. This course builds a strong foundation for your cybersecurity career.
As this is the level 1 course of cybersecurity, you would not get a job by only this course. To get prepared for a job in this field you must require the knowledge of performing penetration testing on systems and applications, that can be achieved by enrolling in our level 2 of cybersecurity and penetration testing course.
Post COVID-19 would be a Cyber Security era. Everyone during COVID-19 is making their business to run online, this must require them to make their businesses and clients make and feel safe online. There is a huge scope in Cyber Security as we can see that online hacking, online frauds, and online security awareness demands a lot of manpower. The more and new cyber risks are evolving daily, a lot of new attack vectors and malware or ransomware attacks are increasing daily. The more business went online, the more manpower it will require to comply with cyberattacks also 80% of cyber attacks happened on small and medium-sized businesses.
Your complete journey with us would be like this. Simply register online with us by filling the online Google form and submitting the required documents at info [AT] truephers.com email id and submit the INR 1000/- as a registration amount through our online payment page. We will contact you by email or telephonically to announce the batch starting date and timings. The classes can be online or offline at the student’s choice. The classes will be led by certified ethical hackers only. The classes can be from Monday to Friday of up to 2 hours or from Saturday & Sunday of up to 5 hours each day. You will be provided with a highly detailed and specially crafted book for your full course to make you more comfortable during learning. There would be an online quiz after completing each module. After completing the full course you will be asked for an online exam date. The online exam is the real way to find your ability to hack. You can email for further questions on the online exam at info [AT] truephers.com. After the completion of the online exam, you will be rewarded with the Truephers Certified Cyber Security Analyst exam certificate. The learning penetration testing and cybersecurity would be great fun for you as the teaching is for us.