Today technology has become more complex and it is integrated into our social and work lives, the need for security is rapidly gaining significance where confidential information and critical infrastructure face risks of being hacked. 

Share:

Introduction

A serious risk is that an online criminal might exploit any poor network at home which may let the intruder or the hacker listens to network traffics in order to steal sensitive information such as usernames, passwords, emails, browsing history, etc. or launch malicious attacks.

Cyber Security is designed to train students and develop their skills to be able to detect, monitor, and prevent cyber security threats and risks, in addition to maintain their capabilities to think as a hacker to do the required actions when

attacks are occurred.

Objectives

Cyber Security Diploma aims to teach students essential technical skills to secure computer and network resources and to handle cyber range exercises. Students will also learn how to apply the principles and practices of ethical hacking, and to carry out the forensics process in computers and mobile devices.

  • Chapter 1: Introduction to Cyber Security
    • Current Threats and Risks.
    • Ethical Hacking Scope
    • Hacking Types.
    • Hacking Phases.
    • Hacker Types.
    • Hacking Terms.
    • Recent security threats and risks.
  • Chapter 2: Network Concepts
    • TCP and OSI Models.
    • Network Protocols.
    • IP Addressing.
    • Network Devices.
    • Network Services.
  • Chapter 3: Network Security
    • Network Security Devices.
    • Firewall Types.
    • IDS.
    • IPS.
    • Network Hacking.
  • Chapter 4: Linux Concepts.
    • Linux Distributions.
    • Linux Installation.
    • Linux Tools and Commands.
    • Linux File System.
    • Linux Programs Management.
    • Linux Users Management.
  • Chapter 5: Operating System Security
    • Internal Firewall.
    • E-Mail.
    • E-Mail.
    • Authentication.
    • Permissions.
    • Encryption.
    • Defense-in-Depth .
  • Chapter 6: Windows Security
    • Privileges and Permissions.
    • File System.
    • File and Disk Encryption.
    • Windows Updates.
    • Windows Security Assessment.
    • Ports and Services.
  • Chapter 7: Windows Server
    • Install Windows Server.
    • Install DHCP.
    • Install WSUS.
    • Install Hyper-V
    • Configure NLB.
    • Backup.
  • Chapter 8: Windows Server Active Directory
    • Install Active Directory.
    • Install DNS.
    • Configure Active Directory
    • Configure DNS.
    • Configure GPOs.
  • Chapter 9: Ethical Hacking
    • Hacking Phases.
    • Reconnaissance.
    • Network Scanning.
    • System Hacking.
    • Malware Creation.
    • Web Hacking.
    • Mobile Hacking.
  • Chapter 10: Penetration Testing and Vulnerability Scanning.
    • Install Open-Vas.
    • Vulnerability Scanning.
    • CVEs.
    • Exploit Vulnerabilities
    • Bypass Windows Firewall.
    • Perform Penetration Test.
  • Chapter 11: Social Engineering
    • Social Engineering Types.
    • Social Engineering Phases.
    • Social Engineering Scenarios.