Topics To be covered (But not limited to) : |
This course covers the basics of Cyber Security tools, usage, and implementation. Our experts believe exposure to various services and edge cases are key for growth in cyber security, hence we have a curated lab schedule and curriculum to expose the students to live hacking environments much like the services offered by TryHackMe and HackTheBox. In practice, students will learn several methodologies to reach a foothold on the target system all while learning web application exploitation in different technology stacks. Alongside this, we also provide written guides to these environments to train students in the art of hacking.
Hacking in live environments and using tools is a necessary skill but it is necessary to keep in mind that using public exploits keeps you at a significant disadvantage and having the power and influence of creating your advanced tools is a weapon any hacker should possess, hence we train our students in python cybersecurity development using strong secure coding principles to create, license and distribute open-source software tools in the community. We will cover python packaging, PyPI, Pytest, Tox, basic CI/CD, git hooks, and the use of the git version control system. Such skills will allow students to write their exploits and understand the underlying infrastructure and libraries current tools are built on.
After learning how to write advanced applications it’s important to understand how real-world applications work especially when interacting beyond the local environment i.e Networking. We will cover TCP/IP, BGP, DNS, IMAP, SSL, TLS, and every other major protocol currently in operation. These protocols are commonly found in organizational networks and decoding such network streams is a necessary skill for any cyber security professional. We will also cover all the basics such as DHCP, HTTP, HTTPS, and the different headers used in such protocols.
Understanding how computers talk to each other without execution or providing any more access or control is a necessary part of any cyber security course, but understanding how such security practices tie into the larger picture of organizational security falls under the purview of IT Security policy and risk assessment. We cover theoretical concepts such as different access control methods, IAAA, CIA Triad, and other key factors in ensuring operational security. This makes any candidate instantly more attractive. Additionally other than generic systems such as web servers and active directories every organization has different needs such as outdated and vulnerable systems, such devices tend to carry a high amount of risk and a Cost-Benefit analysis is necessary to determine the need to upgrade and secure such systems. Our experts believe in promoting realistic practices, not an ideal environment to increase creativity and participation. |