Tr ^ ining
Curriculum
designed to get
you hired
Cybersecurity Professional
This course is mapped to the popular Cybersecurity Professional Certification Exam from US-Council.
The cybersecurity professional course provides comprehensive training in all aspects of cyber defense methodologies. This course covers the proactive defense mechanisms required of a cybersecurity professional including ethical hacking, firewalls, IPS, vulnerability assessment and cryptography. Vital cybersecurity reactive techniques are also discussed including SIEM, mobile and digital forensics, log analysis and patch management. This course consists of three modules viz
Security Risk Assessment (Ethical Hacking)
Proactive Defense and Countermeasures
Incident Response and Management
A thorough understanding of the underlying principles of networking and operating systems is a prerequisite to pursuing this advanced course. The student is expected to be knowledgeable in IP networks, TCP / IP stack, protocols like http, https, ICMP, ARP, services like DNS, DHCP, LDAP, telnet, ssh as well as routing protocols like RIP, EIGRP, BGP, etc. Expertise in Linux and Windows servers and related technologies is a must.
Key Topics:
Security Risk Assessment
Dos and DDos Attacks
Attack Mitigation Techniques
Firewalls, IDS, IPS
Cryptography
Incident Response and Management
Log Analysis
Forensics
The course will cover:
Module 1: Security Risk Assessment (Ethical Hacking)
Introduction to Ethical Hacking
Footprinting
Scanning
Proxy
Hacking Web Servers & Web Applications
Session Hijacking
Denial of Service
System Hacking
Sniffers
Phishing
Malware
Wireless Hacking
Kali Linux
Module 2: Proactive Defence and Countermeasures
Introduction to Security
Firewalls
Virtual Private Networks
Intrusion Prevention Systems
High Availability
Virtual / Cloud Devices Security
Host Security
Module 3: Incident Response and Management
SIEM
Incident Response
Mobile Forensics
Ethical Hacking and Prevention
In a span of 2 weeks, we take you from novice to expert in ethical hacking. This is the only course which teaches both hacking and counter measure techniques. This course is entirely hands on and real time oriented. And need we say the instructors are network security and intrusion specialists with several years of experience.
The Ethical Hacking and Prevention course is the ultimate word in ethical hacking training. It is periodically updated to meet the demands of the industry. To become certified, an ethical hacker needs to demonstrate his mastery over a range of security technologies and hacking techniques.
This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. Many courses have cropped up offering training in so-called “ethical hacking”. But these courses deal with only one half of the security equation. To build highly secure networks, professionals need to be aware of different methods of hacking and at the same time know how to make networks secure from these intrusions using firewalls, UTMs, antivirus, etc. This is the only course which teaches both hacking and countermeasure techniques.
The course will cover:
Introduction to Ethical Hacking
FootPrinting
Scanning
Hacking Web Servers & Web Applications
Session Hijacking
SQL Injection
Evading Firewalls, IDS & Honeypots
Buffer Overflow
Denial of Service
Cryptography
System Hacking
Sniffers
Malware
Wireless Hacking
Kali Linux
Penetration Testing
Counter Measure Techniques for Network level attacks
Counter Measure Techniques for Local Systems
Counter Measure Techniques for Malware Attacks
Penetration Testing Expert
The course is specifically designed for security professionals who want to become experts in network penetration testing. This course teaches the tools and techniques to test a network’s defense mechanisms and uncover any loopholes before they are breached by hackers. It covers penetration testing of routers, switches, firewalls, IDS / IPS as well as hosts and servers running on Windows and Linux.
The course will cover:
Introduction To Penetration Testing
Information Gathering
Pentesting Network Devices
Pentesting Windows Networks
Pentesting Linux Networks
Pentesting Mobile Application
Attacking Via The DMZ
Post Exploitation Techniques
Privilege Escalation
Keeping Access
Scenario Based Pentesting
Social Engineering Attacks
Anti-virus Evasion Techniques
Firewall and IDS Evasion
Salesforce
Salesforce Course Content
Admin Part:
Introduction to Salesforce Admin
Salesforce Classic vs Lightning Experience.
Organization Setup ( Company Profile , Salesforce User Interface, Salesforce Editions)
Salesforce Account Creation (User Setup)
Security Control Mechanism ( OWD, Role Hierarchy , Sharing Rule Mechanism)
User Access Control ( User Management, Profiles, Roles, Permission Sets, Apps)
Opportunities, Campaigns , Leads
Standard and Custom Objects ,Field Dependency , Controlling Field, Field Level Security
Email Templates,Workflow Process and Approval Process
Validation Rules .PageLayouts and RecordTypes
Import Data Wizard and Data Loader
Domain Management ,Formula Fields
Reports and Dashboards
Data Models and Data Management
Development Part:
Introduction to APEX Programming
Developer Console
Datatypes used in APEX Programming
Classes, Objects
Access Modifiers
Collections ( Lists,Sets, Maps)
Sobjects
Workbench
SOQL,SOSL
APEX Triggers
DML Operations
Email Programming
BatchAPEX Jobs
Visualforce Pages
APEX Components and APEX Input Components
Testing Methods
Arrays
Governor Limits in Salesforce
Database Class, Database.Query Locator
Software QA
Manual Content
Fundamentals
Introduction to Testing
Importance of software Testing
Principles of Software Testing
Psychology of Testing
SDLC models
Verification &Validation
Testing Techniques
Static Testing Techniques
Dynamic Testing Techniques
Levels of Testing
Unit Testing
Integration Testing
System Testing
Acceptance Testing
Initial Level Testing
Sanity Testing
Smoke Testing
Manual Testing Process
Test Initiation
Test Plan
Test Design (Test data preparation, Test case design)
Test Metrics
Test Execution
Defect Tracking Life Cycle(DTLC)
Bug Report
Test Closer
Manual Testing vs. Automation Testing
Selenium Content
Introduction
What is automation testing?
What is the use of automation testing?
What we need to Automate?
What is Selenium?
Advantages of Selenium
Different flavors’ in Selenium
IDE
Selenium RC
Selenium Web Driver/Selenium 3.0
Selenium-Grid
Java Introduction
Features of Java
Installing Eclipse
Project creation in eclipse
Packages
First java program
Data types & Variable
Operators
Control Statements
->IF Statement
->Switch Statement
->While Loop
->Do While Loop
->For Loop
->For each Loop
Arrays
Strings
Methods
Object Oriented Programming
Introduction
Class
Object
Inheritance
Polymorphism
Encapsulation
Abstraction
Interfaces
Packages
Selenium Web Driver
Architecture of selenium web driver
Downloading web driver Jars configuring in eclipse
Drivers for Firefox, IE and Chrome
First Program in Web driver
Execution and Debugging
Locators
Web Element Commands
Working with Textbox
Working with Radio buttons
Working with check box
Working with dropdowns
Browser Commands
Navigation Commands
Working with Alerts – windows and web
Working with Wait & Implicit Wait
Reading data from Property files
Working with Excel
Implementing Assertions
Working with multiple browsers
Capturing Screenshots
Handling Frames
Keyboard and mouse operations using Actions class
Writing X-path dynamically
Automation Frameworks (Modular, Data Driven, Keyword Driven)
Developing WebDriver scripts using Junit &Test NG Frameworks
Page Object Model (POM)
Maven & Jenkins Integration with Selenium
Selenium Grid
Introduction to Grid 2
AWS
. A Short history
. Client Server Computing Concepts
. Challenges with Distributed Computing
. Introduction to Cloud Computing
. Why Cloud Computing?
. Benefits of Cloud Computing
Cloud Computing Deployment Models
. Private Cloud
. Public Cloud
. Hybrid Cloud
Cloud Delivery Models
. Software as a Service (SaaS)
. Platform as a Service(PaaS)
. Infrastructure as a Service (IaaS)
Introduction to AWS:
. Subscription to AWS
. AWS Free tier – Limits and usage
. Introduction to the AWS Management Console
Elastic Compute Cloud (EC2) Essentials
. Regions and Availability Zones – How to choose the right one
. Amazon Machine Images (AMI)
. Working with AMIs
. Choosing the right AMI
. Deciding what goes into an AMI
. Finding the right AMI
. Pricing model in EC2 instances
. Deciding between On-demand instances, Spot instances, Reserved instances, Scheduled Instances,
Dedicated Hosts
. EC2 Reserved Instance
. AWS Marketplace
EC2 Instances
. Building an EC2 Windows instance & Linux Instance
. Setting up security
. Security via Key Pairs
. Working with the Security Group
. Different IPs assigned to an EC2 instance
. Assigning Elastic IPs
. Logging into the instance
. Creating your own AMI/Registering your own AMI
. What is a placement group and advantages of placement groups
. EC2 instance protection
. User Data Management
. AWS Simple System Manager (SSM)
Elastic Block Store (EBS)
. Creating and deleting volumes
. Attaching and detaching volumes
. Mounting and Unmounting the attached volume
. Creating snapshots
. Increasing the volume size
Elastic Load Balancer (ELB)
. Creating a load balancer
. Internal Load balancer
. External Load balancer
. Load balancing protocols
. Security groups for the load balancer
. Configure health check for the load balancer
. Adding multiple instances to the load balancer
. Cross-zone load balancing
. Connection Draining
Auto Scaling:
. What is auto scaling?
. Autoscaling components
. Benefits of autoscaling
. Creation of launch configuration
. Configuration of autoscaling policies based on the Load on EC2 instances.
. Advantages of using Auto scaling with Elastic Load balancer (ELB).
Simple Storage Service (S3)
. Creating and deleting buckets
. Adding objects to buckets
. Getting objects
. Deleting objects
. Creation of a static website using S3 storage
. Uses of S3 storage
. Working with Permissions of S3.
. Life cycle management in S3
. Accessing S3 storage via Tools
Glacier Storage:
. Creating Vaults
. Accessing the Glacier vault using tools
. Using Glacier for backups
. Retrieval period
Identity and Access management (IAM)
. Creation of user accounts in AWS
. Setting up multi factor Authentication (MFA)
. Roles in IAM
. Groups in IAM
. Delegation of permissions for users
. Creation of custom policies for delegation
. Account settings
. Credential Report
Virtual Private Cloud (VPC)
. Different types of networks that can be setup in AWS
. Creating a new VPC
. ACL & Security Groups
. Creation of Internet Gateway
. Connecting to instances in the gateway
Cloudwatch
. Debugging cloud related issues
. Monitoring the AWS Service Health Dashboard
. Monitoring with Cloud watch
. Getting statistics for a specific EC2 instance
. Getting aggregated statistics
. Metrics for other AWS Services and related namespaces
. Setting up notifications
Simple Notification Services (SNS)
. Creation of a topic
. Subscribing to topic via Email
. Setting notification for EC2 instance changes
Simple Queue Service (SQS)
. Creation of a queue
. Sending messages to the queue
. Setting SNS to SQS
. Retrieving messages from SQS
Route 53:
. Route 53 Overview
. Setup internal DNS Namespace
. Creating different records in Route 53
Directory Services:
. Setup Active directory
. Adding EC2 instances to domain
. Overview of different directory services
Elastic Beanstalk
. Creation of Web apps using Elastic Beanstalk
. Environment overview
. Migrating content in different environments.
. Modifying the properties of the deployment.
Relational Database Service (RDS)
. Selecting the Engine
. Configuring the Database Engine
. Creating your Database
. Setting up automatic backups
. Authorizing access to the DB via DB Security Groups
Cloud Formation:
. Building AWS infrastructure as a code
. Utilization of Sample templates
. Introduction to JSON
Devops
What is DevOps?
History of DevOps
What is Dev and Ops
DevOps definition
DevOps and Software Development Life Cycle
Build and release workflow
DevOps main objectives
GIT (SCM)
What is GIT ?
Installing Git for Windows
Basic Commands Overview
Diff b/w Git and Svn
Git stages
Creating Branches
Git merge and rebase
Backing Out Changes
Renaming and Moving Files & Deleting Files
Git Repository Setup
Git push, pull and fetch
Git Stash
Git Conflicts
Git fetch
How to use Github
MAVEN
Over view of Maven
Diff b/w Maven and Ant
How to install Maven in Windows and Linux
Maven Phases
Maven repositories
How to create .Jar, .war and .ear files
How to add dependency files
How to Deploy Executable files in Application Servers
JENKINS (CI/CD)
What is CI/CD
Introduction to Jenkins
History of Jenkins/Hudson
How to install Jenkins in Windows and Linux
How to create Jobs
Diff types of jobs
Working with Github
Working with Build tools
Build from Github Project
Managing Remote Systems with Jenkins
Parameterised Builds
Securing Jenkins
Scheduling Builds
How to install plugins in Jenkins
Setting up Different Types of Automated Builds
How to configure one job to another job
Configure Global Security Jenkins Administration
How to create maven type job
How to create ant type job
Scheduling build jobs
How to deploy code in servers
Authentication and Authorization
How to create Nodes in diff Servers
Most useful 20 plugins
TOMCAT
How to install Tomcat in windows
How to install Tomcat in Linux
How to deploy code in Tomcat
Deploying code by using Jenkins
SonarQube
What is SonarQube
How to Install SonarQube
Analyzing with Sonarqube scanner for Maven
Integrate Sonaqube with Jenkins
CHEF
Workflow of Chef
How to install Chef in Linux and Windows
What is Work-station, Chef-Server, Nodes
Servers and Nodes concept
Chef Configuration Concepts
Workstation Setup
Creating Cookbooks and uploading into server
How to use Ruby in Chef
About Bootstrap
How to manage Chef-Servers
Create roles
Add Roles to organization
How to Add Run list to Node
Check node Details
How to create Databags
Add Databags to organization
Create a server and add to organization
Check node details using knife
Create organization
Add yourself and node to organization
Adding nodes to Chef-Server
What is Puppet
What is diff b/w Puppet and chef
AWS
Introduction of cloud
Benfits of AWS
EC2
EBS
VPC
ELB
Auto scaling Group
IAM
AMI
Snapshots
Elastic ip
Virtulization
Docker
Learning the Basics of Docker
Introduction to Docker
Containers vs Virtual Machines
Docker Architecture
Docker Hub
Docker Installation
Creating Our First Image
Working with Multiple Images
Packaging a Customised Container
Running Container Commands with Docker
Managing and Removing Base Images
Pushing to Docker Hub
Creating Shared volume groups
Creat own images
LINUX and Shell Scripting
All basics of linux
How to create files, dir, and groups
How to change permisionsof files, dir, and groups How to create users
SSh
scp
Cron
Shell scripting
SonarQube
What is SonarQube
How to Install SonarQube
Analyzing with Sonarqube scanner for Maven
Integrate Sonaqube with Jenkins