Upgrade Your Career with Exciting Offers on our Career-defining Courses Upto 50% OFF | Offer ending in:
D H M S Grab Now
X
infosectrain training

Events on InfosecTrain

Home / All Events / Cybersecurity Foundation Course: FREE 64-Hour Bootcamp

Speaker(S):

Bharat, Nawaj, Sanyam, Rishabh, Abhishek, Amit

Cybersecurity Consultants & Certified Trainers

LIVE EVENT

Cybersecurity Foundation Course: FREE 64-Hour Bootcamp

27 Feb to 12 Apr (Weekdays)
08.00 PM -10.00 PM (IST)
7340 people have registered

Agenda for the BootCamp

NETWORKING BASICS   (27 Feb – 3 March)

Day 1 – Introduction

  • What is Network?
  • Network types
  • Networking Models
  • Methods of data transmission

Day 2

  • Introduction of OSI model
  • Understanding the flow of data through every layer
  • Protocols in every layer of OSI model

Day 3

  • Types of network Media
  • Network topologies
  • Networking devices
  • TCP/IP protocol suite
  • IPv4 Addressing
  • IPv6 Introduction

Day 4

  • Routing and Switching
  • Dynamic and static routing
  • Types of switching – circuit switching, packet switching, message switching
  • Protocols in routing and switching

Day 5

  • Basics of WAN
  • WAN transmission technologies
  • Network Troubleshooting tools
  • Overview of SDN

DEFENSIVE SECURITY BASICS    (6 – 17 Mar)

 Day 6

  • Cybersecurity vs Information security vs Privacy
  • CIA triad
  • Basic terminologies in security
  • Hackers and their types
  • Teams in Cybersecurity

Day 7

  • Social Engineering
  • Types of social engineering attacks
  • Vulnerability Assessment
  • Types of Vulnerability Scanning

 Day 8

  • Cryptography an introduction
  • Basic terminologies in cryptography
  • Encryption and its types
  • Encodings
  • Digital signature
  • Digital Certificates
  • Public Key Infrastructure introduction
  • Certification authorities and certificate types
  • Certificate chaining

Day 9

  • Network security Appliances
  • Firewall and its types
  • Security monitoring
  • SIEM summary
  • What is endpoint security
  • Endpoint security technologies – (EDR, XDR, MDR)

Day 10

  • Introduction to packet analysis
  • Analyzing traffic using Wireshark
  • Mobile device security
  • Mobile device management and policies
  • Safety measures to follow for mobile device security

Day 11

  • What is data privacy?
  • Types of data
  • Data privacy controls
  • Data privacy laws

Day 12

  • Digital forensics introduction
  • Chain of custody
  • Order of volatility
  • Evidence Acquisition
  • Tools used in Digital Forensics

Day 13

  • How Redundancy can increase availability?
  • Fault tolerance vs redundancy
  • Power redundancy
  • Disk Redundancy
  • Network redundancy
  • Backups and its types

Day 14

  • Physical security in an Enterprise
  • Physical security controls
  • Air gaps
  • Safes and vault
  • HVAC, hot aisle and cold aisle

OFFENSIVE SECURITY BASICS  (20 -31 Mar)

Day 15

  • Introduction to Attacks
  • Introduction to penetration testing
  • Penetration testing methodologies
  • Why penetration testing is important for an organization?

Day 16

  • Reconnaissance through search engines
  • Website Reconnaissance
  • The OSINT Framework
  • Introduction to scanning
  • Tools of scanning (nmap,nessus)

Day 17

  • Working with nmap
  • Finding open ports, services running and service version with nmap
  • Banner grabbing
  • Scan beyond IDS and Firewall

Day 18

  • Enumeration introduction
  • Introduction to the Metasploit framework
  • Enumerating different services using the Metasploit framework
  • Exploiting vulnerabilities to gain access

Day 19

  • Privilege escalation introduction
  • Methods to escalate privileges
  • Covering the tracks by clearing logs
  • Covering tracks by Clearing the history
  • Clearing logs by removing log directory

Day 20

  • Introduction to malware
  • Types of malware
  • Creating a malware
  • Intro to malware analysis

Day 21

  • Sniffing
  • Types of Sniffing
  • Sniffing Techniques

Day 22

  • Denial of Service attacks
  • Categories of DOS and DDOS
  • DDOS and bot-nets
  • DOS Tools
  • Countermeasures of DOS attack

Day 23

  • Introduction to Wireless networks
  • Types of Wireless Encryption
  • Wireless hacking tools

Day 24

  • Web application Basics
  • OWASP Top 10 2021 Introduction
  • Exploiting vulnerabilities of web application
  • Countermeasures of vulnerabilities
  • Secure coding practices

 BASICS OF CLOUD COMPUTING   (3  – 5 apr)

 Day 25

  • Introduction to Cloud computing
  • Advantages of cloud over on-premises
  • Limitations of cloud
  • Service models
  • Deployment models

Day 26

  • Virtualization in cloud
  • Types of Hypervisors
  • Docker vs Container
  • Cloud service providers
  • Types of services provided by cloud
  • Get acquainted with cloud environment
  • Cloud compute security

Day 27

  • Cloud storage security
  • Cloud networking security
  • VPC and Transit gateways
  • Introduction to AWS infrastructure
  • Security groups in AWS
  • Serverless architecture
  • EC2
  • S3 buckets
  • AWS Infrastructure
  • Instances and their types

 INFORMATION SECURITY MANAGEMENT   (6 -7 APR)

Day 28

  • Introduction to Information Security Management
  • Access Controls
  • Security Policies

Day 29

  • Overview of Incident Response Process
  • Risk Management

ISO 27001   (10-11 APR)

Day 30

  • What is ISO?
  • The ISO/IEC 27000 family of standards
  • Advantages of ISO/IEC 27001

Day 31

  • Certification process
  • Certification bodies
  • Fundamental concepts and principles of information security

Day 32 (12 APR)

Interview Preparation

7340 people have registered

Speaker:

Bharat, Nawaj, Sanyam, Rishabh, Abhishek, Amit

Cybersecurity Consultants & Certified Trainers

Other upcoming events

CCSP Last Minute Prep -Q&A Session with Cloud Security Expert

31 Mar (Fri) , 08:00 PM -09:00 PM (IST)
View detail
366 people have registered

Free Data Science Fast Track Course

27 Mar to 07 Apr (Weekdays) , 08:00 PM -11:00 PM (IST)
View detail
454 people have registered

CISSP Q&A Review Session

07 Apr (Fri) , 08:00 PM -09:00 PM (IST)
View detail
304 people have registered

Transitioning to OT Security: Key Concepts and Career Opportunities

15 Apr (Sat) , 07:00 PM -09:00 PM (IST)
View detail
500 people have registered

Cloud Computing Expert Masterclass

24 Apr to 04 May (Mon -Thu) , 07:00 PM -10:00 PM (IST)
View detail
401 people have registered

Preparation Strategy for CISSP-ISSAP

29 Apr (Sat) , 07:00 PM -08:00 PM (IST)
View detail
341 people have registered


TOP