Speaker(S):
Bharat, Nawaj, Sanyam, Rishabh, Abhishek, Amit
Cybersecurity Consultants & Certified Trainers
LIVE EVENT
Cybersecurity Foundation Course: FREE 64-Hour Bootcamp


Agenda for the BootCamp
NETWORKING BASICS (27 Feb – 3 March)
Day 1 – Introduction
- What is Network?
- Network types
- Networking Models
- Methods of data transmission
Day 2
- Introduction of OSI model
- Understanding the flow of data through every layer
- Protocols in every layer of OSI model
Day 3
- Types of network Media
- Network topologies
- Networking devices
- TCP/IP protocol suite
- IPv4 Addressing
- IPv6 Introduction
Day 4
- Routing and Switching
- Dynamic and static routing
- Types of switching – circuit switching, packet switching, message switching
- Protocols in routing and switching
Day 5
- Basics of WAN
- WAN transmission technologies
- Network Troubleshooting tools
- Overview of SDN
DEFENSIVE SECURITY BASICS (6 – 17 Mar)
Day 6
- Cybersecurity vs Information security vs Privacy
- CIA triad
- Basic terminologies in security
- Hackers and their types
- Teams in Cybersecurity
Day 7
- Social Engineering
- Types of social engineering attacks
- Vulnerability Assessment
- Types of Vulnerability Scanning
Day 8
- Cryptography an introduction
- Basic terminologies in cryptography
- Encryption and its types
- Encodings
- Digital signature
- Digital Certificates
- Public Key Infrastructure introduction
- Certification authorities and certificate types
- Certificate chaining
Day 9
- Network security Appliances
- Firewall and its types
- Security monitoring
- SIEM summary
- What is endpoint security
- Endpoint security technologies – (EDR, XDR, MDR)
Day 10
- Introduction to packet analysis
- Analyzing traffic using Wireshark
- Mobile device security
- Mobile device management and policies
- Safety measures to follow for mobile device security
Day 11
- What is data privacy?
- Types of data
- Data privacy controls
- Data privacy laws
Day 12
- Digital forensics introduction
- Chain of custody
- Order of volatility
- Evidence Acquisition
- Tools used in Digital Forensics
Day 13
- How Redundancy can increase availability?
- Fault tolerance vs redundancy
- Power redundancy
- Disk Redundancy
- Network redundancy
- Backups and its types
Day 14
- Physical security in an Enterprise
- Physical security controls
- Air gaps
- Safes and vault
- HVAC, hot aisle and cold aisle
OFFENSIVE SECURITY BASICS (20 -31 Mar)
Day 15
- Introduction to Attacks
- Introduction to penetration testing
- Penetration testing methodologies
- Why penetration testing is important for an organization?
Day 16
- Reconnaissance through search engines
- Website Reconnaissance
- The OSINT Framework
- Introduction to scanning
- Tools of scanning (nmap,nessus)
Day 17
- Working with nmap
- Finding open ports, services running and service version with nmap
- Banner grabbing
- Scan beyond IDS and Firewall
Day 18
- Enumeration introduction
- Introduction to the Metasploit framework
- Enumerating different services using the Metasploit framework
- Exploiting vulnerabilities to gain access
Day 19
- Privilege escalation introduction
- Methods to escalate privileges
- Covering the tracks by clearing logs
- Covering tracks by Clearing the history
- Clearing logs by removing log directory
Day 20
- Introduction to malware
- Types of malware
- Creating a malware
- Intro to malware analysis
Day 21
- Sniffing
- Types of Sniffing
- Sniffing Techniques
Day 22
- Denial of Service attacks
- Categories of DOS and DDOS
- DDOS and bot-nets
- DOS Tools
- Countermeasures of DOS attack
Day 23
- Introduction to Wireless networks
- Types of Wireless Encryption
- Wireless hacking tools
Day 24
- Web application Basics
- OWASP Top 10 2021 Introduction
- Exploiting vulnerabilities of web application
- Countermeasures of vulnerabilities
- Secure coding practices
BASICS OF CLOUD COMPUTING (3 – 5 apr)
Day 25
- Introduction to Cloud computing
- Advantages of cloud over on-premises
- Limitations of cloud
- Service models
- Deployment models
Day 26
- Virtualization in cloud
- Types of Hypervisors
- Docker vs Container
- Cloud service providers
- Types of services provided by cloud
- Get acquainted with cloud environment
- Cloud compute security
Day 27
- Cloud storage security
- Cloud networking security
- VPC and Transit gateways
- Introduction to AWS infrastructure
- Security groups in AWS
- Serverless architecture
- EC2
- S3 buckets
- AWS Infrastructure
- Instances and their types
INFORMATION SECURITY MANAGEMENT (6 -7 APR)
Day 28
- Introduction to Information Security Management
- Access Controls
- Security Policies
Day 29
- Overview of Incident Response Process
- Risk Management
ISO 27001 (10-11 APR)
Day 30
- What is ISO?
- The ISO/IEC 27000 family of standards
- Advantages of ISO/IEC 27001
Day 31
- Certification process
- Certification bodies
- Fundamental concepts and principles of information security
Day 32 (12 APR)
Interview Preparation