What You Will Learn
● Ethical hacking
● Network security
● CISSP
● CompTIA Security
● Information Security
● IT security
● Testing protection against unauthorized access
● OSINT methodology
Cybersecurity training
1. Program in Python and Bash, understand system and network administration on Linux
2. Find and exploit OS and web application vulnerabilities
3. Work with security and access policies
4. Intercept and analyze network traffic
5. Use network scanners
6. Hack wireless networks
7. Use cryptographic information protection systems
8. Work with a large arsenal of hacker software
9. Work with intrusion detection systems
10. Cloud and disk encryption
Milestones
Сomplete course that will allow you to master information security for the whole company or individually.
You will understand the architecture of modern websites, learn what security problems exist, and learn how to solve them. Understand Python and Bash, as well as understand system and network administration on Linux.
Overview
● Penetration Testing
● Phishing Simulation
● Company Security Audit
● Configuration Guide
● Brand Protection
● Secure SDLC
● Smart Contract Audit
● Digital Forensics
Database Security
● Query syntax
● Combining data
● Prepared queries
● Database export and import
● Architecture for constructing the structure of database tables
● SQL injection
Network
● OSI network model
● Network subsystems
● Corporate networks: routing and switching
● Corporate networks: security and governance
Encryption
● Symmetric encryption
● Asymmetric encryption
● Certificates and digital signatures
● Hash function
● Obfuscation and steganography
Python
● Automatization of data collection
● Research of web resources
● Brute force and traffic analysis
● Cracking cryptographic ciphers
● Debugging your code
Deep Cybersecurity
● Collection of information
● Ethical hacking with Nmap
● Brute force attacks
● Operating facilities
● Network attacks and traffic analysis
● Methodological foundations of information security
● Security of wireless systems
● Web application security
● Analysis of mobile applications
● Computer forensics
● Reverse engineering
● Fuzzing
● Reporting systems
● Intrusion and data leak detection tools
● OWASP top 10
● Post-Exploitation and Pivoting
How We Learn
1. Learning New Topic
2. Homework
3. Working with a Mentor
4. Defending thesis