CHCSS. Certified Hands-on Cyber Security Specialist (510)

Similar documents
TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Ethical Hacking and Prevention

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

Hands-On TCP/IP Networking

Penetration Testing with Kali Linux

IT Foundations Networking Specialist Certification with Exam

Understanding Cisco Cybersecurity Fundamentals

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

Hackveda Training - Ethical Hacking, Networking & Security

Implementing Cisco Network Security (IINS) 3.0

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Curso: Ethical Hacking and Countermeasures

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Certified Ethical Hacker (CEH)

CompTIA Network+ Study Guide Table of Contents

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

CompTIA Security+ (Exam SY0-401)

Implementing Cisco Cybersecurity Operations

Advanced Diploma on Information Security

Chapter 2. Switch Concepts and Configuration. Part II

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CCNA. Course Catalog

Erasable Programmable Read-Only Memory (EPROM) Electrically Erasable Programmable Read-Only Memory (EEPROM) CMOS 2.2.

CCNA Exploration Network Fundamentals

Module 1: Penetration Testing Planning and Scoping. Module 2: Basic Usage of Linux and its services

CPTE: Certified Penetration Testing Engineer

CISCO QUAD Cisco CCENT/CCNA/CCDA/CCNA Security (QUAD)

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

CompTIA Security+ Certification

Scope and Sequence: CCNA Exploration v4.0

McAfee Certified Assessment Specialist Network

Course 831 Certified Ethical Hacker v9

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 12 May 2018

CompTIA Cybersecurity Analyst+

Scanning. Introduction to Hacking. Networking Concepts. Windows Hacking. Linux Hacking. Virus and Worms. Foot Printing.

Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018

Course 831 EC-Council Certified Ethical Hacker v10 (CEH)

Advanced Ethical Hacking & Penetration Testing. Ethical Hacking

CompTIA Network+ N10-005

Certified Vulnerability Assessor

V8 - CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 03 Feb 2018

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

Certified Secure Web Application Engineer

Interconnecting Cisco Networking Devices Part 1 (ICND1) Course Overview

The StrideLinx Remote Access Solution comprises the StrideLinx router, web-based platform, and VPN client.

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Security+ SY0-501 Study Guide Table of Contents

Practice Labs Ethical Hacker

CISSP - Certified Information Systems Security Professional

Strategic Infrastructure Security

CompTIA Network+ Course

EZY Intellect Pte. Ltd.,

Network Engineering/Cyber Security I & II

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Cisco CCNA (ICND1, ICND2) Bootcamp

Software Development & Education Center Security+ Certification

Certified Ethical Hacker Version 9. Course Outline. Certified Ethical Hacker Version Nov

Advanced Network Administration. 1. Course Description Enabling Communication across Networks Secured Communication using Network Devices

Audience. Pre-Requisites

COURSE 20741B: NETWORKING WITH WINDOWS SERVER 2016

CSWAE Certified Secure Web Application Engineer

20741: Networking with Windows Server Course Content. Course ID #: W Hours: 35. Course Description: At Course Completion:

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

CompTIA A+ Accelerated course for & exams

CEH: CERTIFIED ETHICAL HACKER v9

Networking with Windows Server 2016

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify Labs.

Fundamentals of Network Security v1.1 Scope and Sequence

"Charting the Course... Interconnecting Cisco Networking Devices Accelerated 3.0 (CCNAX) Course Summary

Computer Networking Fundamentals

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Entry Level Assessment Blueprint Computer Networking Fundamentals

Cyber Common Technical Core (CCTC) Advance Sheet Windows Operating Systems

Course Workbook 1st Edition

Mobile MOUSe ROUTING AND SWITCHING FUNDAMENTALS ONLINE COURSE OUTLINE

SWITCH Implementing Cisco IP Switched Networks

CEH v8 - Certified Ethical Hacker. Course Outline. CEH v8 - Certified Ethical Hacker. 15 Jan

Networking Fundamentals Training

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

DIS10.1 Ethical Hacking and Countermeasures

The primary audience for this course includes Network Administrators, Network Engineers,

DIABLO VALLEY COLLEGE CATALOG

Certified Cyber Security Analyst VS-1160

Course Outline. Networking Essentials, Fifth Edition Pearson ucertify. Networking Essentials, Fifth Edition Pearson ucertify

Table of Contents. Course Introduction. Table of Contents Getting Started About This Course About CompTIA Certifications. Module 1 / Server Setup

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process.

Course Networking with Windows Server 2016

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

Course Outline. Pearson: Networking Essentials, 4/E (Course & Lab)

OHLONE COLLEGE Ohlone Community College District OFFICIAL COURSE OUTLINE

Introduction p. 1 Self-Assessment p. 9 Networking Fundamentals p. 17 Introduction p. 18 Components and Terms p. 18 Topologies p. 18 LAN Technologies

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

Computer Forensics: Investigating Network Intrusions and Cyber Crime, 2nd Edition. Chapter 3 Investigating Web Attacks

Online Intensive Ethical Hacking Training

Transcription:

CHCSS Certified Hands-on Cyber Security Specialist () SYLLABUS 2018

Certified Hands-on Cyber Security Specialist () 2 Course Description Entry level cyber security course intended for an audience looking to make a career change, or alternatively for those wishing to enter the world of cyber and information security. Students in this course will be exposed to a whole range of topics and methods of defense and attack in the cyber world and practice the material with tools that simulate what happens in the real world, tools required for the ongoing work of modern cyber security person in a changing world. This unique training course is developed by the leading professionals in their field in Israel, and is comprised of a variety of topics required in the industry, with a great emphasis on imparting practical knowledge in cyber defense. The aim of this course is to expose the student to a whole range of theories and practical tools in order to create a broad knowledgebase that will enable the student to successfully integrate into the cyber industry. The course also contains homework for the students as additional material. Target Audience This course is intended for anyone wishing to learn cyber security and enter the cyber world. Prerequisites Good understanding of basic Windows environments Technical level of English reading 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 3 01 INTRODUCTION ( Hours) Subject Description Hours Introduction to the Cyber world What is the Cyber world, Players in the cyber world, Motivation, Pros and Cons, CIA triad, The life-cycle of an attack, Types of malwares, Basic concepts, etc. 02 NETWORKING ( Hours) Subject Description Hours Introduction to network Layer 1 Layer 2 Introduction to communication, types of equipment, OSI model, TCP/IP model RJ4, Cables STP/UTP, Fiber optics, RS232, Serial, Computer architecture LAN, WAN, Ethernet, MAC addresses, static/dynamic learning, unicast/broadcast/multicast, VLANs, Spanning tree Layer 3 IPv4, Public address/private address, Subnets, CIDR, IPv6, Decimal/Octal/Hex conversion, Network topology, Proxy, Routing (Static/Dynamic protocols) Layer 3 - Continues + Layer 4 Network Protocols BGP, HTTP, HTTPS, Telnet, SSH, DNS, DHCP, SNMP, SMTP FTP 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 4 Basic configuration of Switches and routers with the CLI Working with packet tracer, Configure VLANs, Port mirroring, Trunk/Access, Routing on stick, CLI commands, port security, Access lists, users, logins, line VTY 20 Routing, Architecture, Cisco IOS and versions 40 Dress rehearsal Final Project Preparation Final Project (Networking) 3 Final Project (Cisco) 1 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 03 SYSTEM (18 Hours) Subject Description Introduction to Virtual environment VMware\Hyper-V Introduction to Operating System Windows 8.1/7/ - Install and Configure Workgroup \ Domain \ Troubleshoot - IPV Configure Server 2012 R2 Hours Installation, Roles & Features Tools Servers Introduction Active Directory Introduction Active Directory Installation & Configure - DCPROMO Active Directory Users & Computers Users \ Security Group \ OU Design File Management NTFS\Share Permissions (Shadow Copy) DNS Server DHCP Server Registry + Group Policy Password Policy / Auditing Policy / Fine Grained Password Policy / Security Policy 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 6 Securing Windows Server by Using Group Policy Objects Storage + Data transition methods RAID Levels (openfiler) Data transitions methods + Audit Windows Backup Business continuity and DR BCD Methods Cloud computing Office 36, Azure, AWS Final Project (System) Hands-On Labs 1 Preparation for MCSA 70-740 6 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 7 04 SECURITY (170 Hours) Subject Description Hours Network traffic Analyzing Working with Wireshark, NMAP, Type of sniffers, installation, extracting credentials from network traffic, methods of extracting files and objects from network traffic. Follow sessions, filters and statistics Cyber Security Intro Intro Working with Python Introduction to KALI Linux Reconnaissance Methods What is programming language, open new project in pycharm, operators, basic I\O commands, if else, conditions, loops. Installation, Linux's concept, working with the Terminal, tools etc. Google Hacking (with regex), Social Engineering 1 Infrastructure attacks Mitigation of Infrastructure attacks UDP Flood, SYN Flood, DDOS, ARP poisoning, ARP spoofing and MAC spoofing, MITM Encryption, Digital Certificate, NAC, etc. Password cracking and Mitigation Application security - hacking and mitigation Cryptographic Hash functions, Brute Force, Rainbow tables, Password Hijacking Databases and SQL, SQL injection CSRF, Path Traversal, XSS, Session Hijacking, Buffer Overflow, Privilege escalation 20 Exploits and Working with Metasploit 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 8 From Cyber-attack to Cyber security Concept of cyber defense vs hacking etc. End Point security EMMET (including DEP, ASLR, SEH), HIPS, DLP, AV, applockers Organization network security FW and ACL, IPS, NAC, Web Application Control, VPN, DNS Sec, IPsec, Content Disarm and Reconstruction (CDR), Waterfalls, SIEM. Information security and risk assessment standards 1 Patch management and vulnerability assessment The process of risk management and vulnerability Assessment Forensics concepts Concept, Create HD image and mem dump, Analyzing mem dump and HD image Audit Concepts Static and Dynamic malware analysis Strings, exported and imported DLLs, hash, PE structure etc. Using sandbox, Sysinternals and other basic tools Data encryption and authentication Law and Ethics/ Physical security Final exam (Cyber) Hands-On Labs and simulator 1 Total Hours: 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com

Certified Hands-on Cyber Security Specialist () 9 We're Waiting to Hear From You! +972-3-66-31 info@kernelios.com 27 Yosef Lishansky St. Rishon Lezion, Israel +972-3-66-31 info@kernelios.com www.kernelios.com