Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

Cyber Security & Ethical Hacking Fundamentals

No Reviews Yet

Madhapur, Hyderabad

Course ID: 37448

Madhapur, Hyderabad

Students Interested 0 (Seats Left 0)

₹ 20,000

No Reviews Yet

Date and Time

Not decided yet.

Vinod Babu

Certified ECCOUNCIL Trainer, Microsoft Certified Trainer, Certified Ethical Hacker, Certified Hacking Forensics Investigator

About Vinod Babu

Key Skills:
Network & System Security.
Risk Management.
Vulnerability Assessments.
Authentication & Access Control
System Monitoring.
Regulatory Compliance.
System Integration Planning.
Multitier Network Architectures.

CERTIFIED EXPERT IN INFORMATION TECHNOLOGY AND INFOSEC.

Cyber Security/ InfoSec specialist with qualifications include Master’s degree in computer science; CEH, CHFI, MCSA, MCP, CCNA and CEI certifications and detailed knowledge of security tools, technologies and best practices. Sixteen (16) years of experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations.

Certifications
Certified Ethical Hacker –CEH.
Certified Hacking Forensic Investigator – CHFI.
Certified EC-Council Instructor – CEI.
Microsoft - MCSA
Microsoft – MCP
Cisco – CCNA

Offensive InfoSec Technologies:

Security Technologies: Ethical Hacking, Forensic Investigation, Cloud Computing Threats, Advanced Persistent Attack, Virus and Worms Attack, Mobile Threats, Botnet, Insider Attack. Network/Host/Applications Threats, Mis-configuration attacks, Shrink Wrap Codes, Black box and White box testing.

Network Defense, IDS and IPS, Content Filtering, Anti-spyware, SSH, SSL, Digital Certificates, Anti-Virus/Malware/Adware tools.

Operating Systems: Ubuntu, Centos, OpenSuse, Redhat Linux, Windows Server 2012, Messaging, Window 10,8,7, MAC OSX Sierra.

Networking: Managed switches & Routers configuration of Cisco, HP, Siemens, Ericsson, Dell and Cajun deployed for LANs, WANs, VPNs, TCP/IP configurations and routing protocols. Sonic wall / Fortigate / Watch guard Firewalls configurations. Network security: traffic/protocol analysis, firewalls, IDS /IPS, routers, switches, wireless (802.11), and host hardening.

Secure network engineering, management, and monitoring, including 802.11 networks.

Pen testing & Security Tools:
Kali Linux, Windows Forensic Investigation Tools, Nmap, Burp Suite, Fluxion, Megaspoilt, Wireshark and Packetyzer.

IT Experience

Technoprenuer - IT Security Consultant and InfoSec Trainer. – 2010 to Till date.

From 2004 to 2010 worked with various companies as consultant and SME Technocrat at various levels in companies Globalcom , iGate Global Solutions, Tanla Solutions Ltd, Brigade Technologies Pvt Ltd, Taksheel Solutions Ltd.

Summary Of Experience :

More than 15 years of experience in IT Network, System, Security and communication engineering, project management and working IT experience in complex public- and private-sector environments. Outstanding knowledge in the industry, Committed to staying abreast of and advancing leading-edge technology. Strengths include know-how to build effective redundancies into systems. Driven problem-solver with demonstrated ability to successfully lead network and systems engineering projects.

• Host, System, Network, Application level penetration testing and incident response.
• Design and Teach Security courses internationally (e.g., Ethical Hacking, IPv6) with superior analytical and troubleshooting ability.
• Cyber exercise design and delivery, Networking/information security laboratories (face-to-face, virtual), Information systems architecture, integration, project management.
• Network Protocol/traffic analysis, Firewall (Cisco PIX/ASA, pfSense, IP-tables) engineering, implementation, and administration, Networking at Layers 2-4 and 7 (including all major TCP/IP protocols).
• Intrusion Detection/Prevention Systems (IDS/IPS) engineering, implementation, and administration, Networking hardware (routers and switches).

• Engineering, implementation, and administration of Windows/Linux/UNIX (OS X, Redhat/Ubuntu/centos) server platform including hardening and security fine-tuning.

Expertise in Cyber Security:

Define, maintain and enforce application security best practices and demonstrate vulnerabilities to application/system owners, and provide solutions for risk mitigation.
• Expert in Application Security testing for Web, client Server application to assess the vulnerabilities including manual and automated testing of Application
• Strong skills in conducting white, black , grey box testing
• Inspection and Certification ability on security controls as per Open Source Security Testing Methodology Manual (OSSTMM), OWASP, SANS
• All trainings shall be based on the real time Proof-of-concept (PoC) for better understanding.
• Review and identifying the flaws in source code of different applications through manual and automation process.
• Monitoring and track progress of vulnerabilities found and maintain the history of system.
• Providing detailed information in the form of reports on each and every issue that are important in suggested monitoring and scanning on applications and systems.
• Strong knowledge and complete understanding of potential attack vectors like XSS, injection, session hijacking, and social engineering.
• Sound knowledge on cryptographic primitives and its principles.
• Realtime knowledge and solid understanding on OSImodel and networking protocols, such as TCP/IP.
• Thorough understanding of HTTP and HTTPS, as well as their underlying implementations.
• Realtime experience in delivering security testing and ethical hacking modules like CEH, CHFI, ECSA, Penetration Testing, OWASP.
• Experience developing custom tools and/or scripts to accomplish desired goals. Proficiency with industry standard exploitation, forensic frameworks and the aptitude to research and stay up-to-date with current exploits.
• Successfully delivered trainings on various hacking attacks and threats to the cloud computing technology and also provided security remedies to counter cloud computing threats and attacks.
• In-depth knowledge on pen testing techniques to identify threats in cloud systems.
• Explore Heart bleed CVE-2014-0160, Shellshock CVE-2014-6271 and Poodle CVE-2014-3566
• Hacking and security threats to mobile phones and how a mobile phone can be attacked and its remedial measures.
• Keep upto date on recent, upcoming security and threats and its impact such as latest virus, Trojan and Back doors.
• Strong knowledge on IT security controls, laws and standards of India and Federal Laws of USA.


Training On Ethical Hacking :

“Learning the ideaology and approach behind any cyber crime is a vital part of defensive strategy ..BVB ”

To learn what and how to hack is equally important for information security professionals, this knowledge shall enable all possible security practices in finding and fixing security vulnerabilities such as methods used by blackhats “hackers” for penetration into networks and systems ,this shall enable the security professional to provide preemptive solutions. IT networks are fenced with tight security systems built on top of network and systems level security methods, but as evident many times “rat finds its way to cheese” similar to that blackhats improve and develop new methods for penetration into IT networks.

Learning ethical hacking is keeps abreast on checking for vulnerabilities in and around security fence to reinforce the weak areas and create a shield.

The training covers the important offensive methods, below image illustrates Phases and Steps of Ethical Hacking.
No reviews currently Be the First to Review

About the Course

Course Description


The Cybersecurity Fundamentals Online Course will provide learners with principles of data and technology that frame and define cybersecurity. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format will provide a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.


 Learning Objectives:



  • Identify the key components of cybersecurity network architecture

  • Apply cybersecurity architecture principles

  • Describe risk management processes and practices

  • Identify security tools and hardening techniques

  • Distinguish system and application security threats and vulnerabilities

  • Describe different classes of attacks

  • Define types of incidents including categories, responses and timelines for response

  • Describe new and emerging IT and IS technologies

  • Analyze threats and risks within context of the cybersecurity architecture

  • Appraise cybersecurity incidents to apply appropriate response

  • Evaluate decision making outcomes of cybersecurity scenarios

  • Access additional external resources to supplement knowledge of cybersecurity


Pre-Requisites:


It is recommended that you have basic understanding on following concepts prior to attending the training session;



  • OSI model

  • TCP/IP

  • General firewall features, types, issues, and platforms

  • Networking (i.e. ports, protocols, VPNs, etc.).

  • Application security, Risk assessments

  • BYOD


Target Audience :



  • Zero to three years cybersecurity experience

  • Students and recent grads


Course Outline 



  1. Introduction to Cyber security

  2. Cyber security objectives

  3. Cyber security roles

  4. Differences between Information Security & Cyber security

  5. Cyber security Principles

  6. Confidentiality, integrity, & availability

  7. Authentication & nonrepudiation

  8. Information Security (IS) within Lifecycle Management

  9. Lifecycle management landscape

  10. Security architecture processes

  11. Security architecture tools

  12. Intermediate lifecycle management concepts

  13. Risks & Vulnerabilities

  14. Basics of risk management

  15. Operational threat environments

  16. Classes of attacks

  17. Incident Response

  18. Incident categories

  19. Incident response

  20. Incident recovery

  21. Future Implications & Evolving Technologies

  22. New & emerging IT & IS technologies

  23. Mobile security issues, risks, & vulnerabilities

  24. Cloud concepts around data & collaboration

Reviews

No reviews currently Be the First to Review

Discussions

Students Interested 0 (Seats Left 0)

₹ 20,000

Post your requirement and let us connect you with best possible matches for Ethical Hacking & Cyber Security Training Post your requirement now
₹ 20,000 Enquire

Enquire

Submit your enquiry for Cyber Security & Ethical Hacking Fundamentals

Please enter valid question or comment

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Ryna Technologies Pvt Ltd

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer