Course Title: Cyber Security
Duration: 16 Weeks (5 Days a week)
Timings: 9:00 am to 6:00 pm (UTC +5)
No. of Students: 25 Students per batch
Pre-requisites: Fundamentals of Information Technology and Computer Sciences
Mode of Training: Physical Mode (CORVIT Campuses in Karachi & Islamabad)
Language:
  1. Training will be delivered in Urdu & English
  2. Training material will be provided in English language
Training Basic Methodology:
  1. Theatrical knowledge
  2. Lab work
  3. Individual Assignments
  4. Group Assignments
  5. Assessments
Training Material: Soft copy (pdf format) of training material will provide to all students.
Course Content as Per RFP:
  • Information Security Fundamentals
  • Networking Fundamentals
  • Mitigation
  • Security Policies & Procedures
  • Secure Architecture
  • Risk Management
  • Disaster Recovery / RCA-Root Cause Analysis
  • OWASP (Open Web Application Security Project)
  • Secure Network Protocols
  • Information Security Threats and Attacks
  • Social Engineering
  • Hacking Cycle
  • OIDC (OpenID Connect). RABC (Role-Based Access Control). ABAC (Attribute-Based Access Control).
  • Intrusion Detection System
  • Virtual Private Network
  • Wireless Network Security
  • Ethical Hacking and Pen Testing
  • Incident Management / Response
  • Computer Forensics Fundamentals
  • Network Forensics and Investigating Network Traffic
  • Anti-Phishing Malware
Week Wise Enhanced Course Content: (Including Basic Course Content as RFP)
Training Content: Week – 1 Module 1:

  • Introduction to Cybersecurity
  • Objectives & Roles
  • Differences between Information security and cybersecurity
  • What is Cyberspace?
  • What is Cyber security?
  • Why is Cyber security Important?
  • Prerequisites of Cyber security
  • About Kali Linux
  • Different flavor of Linux for Hacking and pentesting
  • Lab Setup
  • Virtualization and OS installations
  • Current Security Landscape
  • Common Security Principles
  • Security for SOHO, Data Center, Cloud and virtual environment
  • Kali and Parrot Linux
  • Directory Structure
  • Basic and admin commands
  • Variables and User Profiles
  • Windows CMD commands
  • PowerShell
  • Windows Registry
  • Commands Alias and Links
  • Secure Access Management
  • Compare In-band and out-of-band management
  • Protection/Hardening of management plane
  • Configure and verify secure access through SNMP v3
  • Module Level Practical Assignment & Demonstration Activity.
Week – 2 Module 2:

  • Users manage management in window
  • Linux User and groups
  • File and folder permission in Linux
  • ACL and Special Permissions
  • NTFS permissions in Windows
  • Data Sharing with SMB
  • Cisco ASA Product Family Overview and Design
  • Introducing the Cisco ASA 5500-X Series Next Generation Firewalls
  • Introducing Cisco ASAv New Features
  • Installation of ASA 9.61v and its management via Cisco ASDM
  • Cisco Packet Tracer
  • Service management with systemctl
  • Automate jobs with Crontab and window scheduler
  • Windows Defender and real time Virus protection Linux and Window Firewall
  • Window Defender and Real time Virus protections
  • Iptables firewall and inbound and outbound traffic rules
  • IP forwarding and MASQUERADE
  • New firewall (Firewall )
  • /etc/security and TCP Wrapper
  • Selinux Booleans and Rules
  • Password Policy with PAM
  • Traffic redirections rules
  • Cisco ASA Firewall/Huawei Firewall Technologies
  • Basic Firewall initialization using CLI and ASDM
  • Firewall Access Control
  • Module Level Practical Assignment & Demonstration Activity.
Week – 3 Module 3:

  • Disk Management
  • SWAP and LVM Partitions
  • Windows Disk  MGT tool
  • Basic T.Shoot of Linux
  • NAT on ASA (IPv4 / IPv6)
  • Object/Auto NAT
  • Manual or Twice NAT
  • Source Based vs Destination based NAT
  • NAT traversal
  • Windows CMD commands
  • PowerShell
  • Linux Shell and variables, .bat Script, .sh Script
  • Basic python scripts and
  • Basic of PHP (Fundamentals)
  • Routing on ASA (Fundamentals)
  • Static / Default
  • Dynamic Routing protocols
  • VLANs and sub-interfaces in ASA
  • Secure DMZ Design & implementation
  • Introduction to Huawei USG Firewall
  • Module Level Practical Assignment & Demonstration Activity.
Week – 4 Module 4:

  • Basic python scripts and
  • Basic of PHP (Advanced)
  • Data sharing Apps
  • DHCP Server and Clients
  • DORA process
  • DNS Server and clients
  • DNS Record Types
  • Virtualization / Context in ASA
  • Firewall Deployment Modes
  • Routed / Layer 3 design
  • Apache and Nginx Web Server
  • IIS Web Server(Test Benchmark) XAMP and LAMP
  • Mail Server with SMTP/POP/IMAP
  • ASA Firewall High Availability
  • Active-Passive deployment
  • Active-Active deployment
  • Redundant Interfaces
  • Aggregated Interfaces
  • Transparent mode Module Level Practical Assignment & Demonstration Activity.
Week – 5 Module 5:

  • Windows Password Break
  • Windows Password Cracking
  • Linux Password Break and Cracking
  • .pdf and .rar file Password Cracking
  • Bios Password
  • Mobile Password Breaking
  • Cisco ASA FirePOWER / Cisco FTD Evolution
  • Deployment Models
  • Initial Setup / Boot strapping
  • Encryption, Decryption
  • Encoding, Decoding
  • Hashing
  • Public and Private Key
  • SSL , TLS, PKI
  • Email Encryption
  • About steganography and Homography
  • Hide data with in picture and video
  • Hide payload with in picture and .pdf documents
  • Executable .bat script hide with in and documents and pictures
  • Concepts of Homography
  • Homography attack with Phishing
  • Countermeasures
  • Modular Policy Framework
  • ASA Clustering
  • Spanned-EtherChannel
  • Interface mode
  • Module Level Practical Assignment & Demonstration Activity.
Week – 6 Module 6:

  • Describe the elements of information security
  • Explain information security threats and attack vectors
  • Describe the hacking concepts, types, and phases
  • Explain the ethical hacking concepts and scope
  • Footprinting Concepts
  • Footprinting trough Search Engine & Social Network
  • Footprinting Attack vectors
  • Footprinting counter measure
  • Understand the information security controls (information defense-in-depth, policies, procedures, awareness, physical
  • Management process, and risk
  • Understand the penetration testing process
  • Fire POWER Traffic flow
  • FirePOWER Access Policy Components
  • Security Zones
  • Creating Individual Objects and Groups
  • Describe the network scanning concepts
  • Use various scanning tools
  • Perform scanning to check for live systems and open ports
  • Perform scanning by using various scanning techniques
  • Scan beyond intrusion detection system (IDS) and firewall
  • Perform banner grabbing
  • Draw network diagrams using network discovery tools
  • Perform scanning penetration testing
  • Describe the enumeration concepts
  • Explain different techniques for Netbios enumeration
  • Explain different techniques for SNMP enumeration
  • Explain different techniques for LDAP enumeration
  • Explain different techniques for NTP enumeration
  • Explain different techniques for SMTP and DNS enumeration
  • Explain other enumerations such as IPsec, VolP, RPC, and Linux/Unix enum
  • Apply enumeration countermeasures
  • Perform enumeration penetration testing
  • Pre-filter policy in Cisco FTD
  • Filtering based on Networks / Ports
  • Filtering based on Web URLs
  • Filtering based on Applications (AVC)
  • Module Level Practical Assignment & Demonstration Activity.
Week – 7 Module 7:

  • Security and Risk Management
  • Understand and apply concepts of confidentiality, integrity and availability
  • Evaluate and apply security governance principles
  • Determine compliance requirements
  • Contractual, legal, industry standards, and regulatory requirements
  • Privacy requirements
  • Understand legal and regulatory issues that pertain to information security
  • Understand, adhere to, and promote professional ethics
  • (ISC)² Code of Professional Ethics
  • Organizational code of ethics
  • Develop, document, and implement security policy, standards, procedures, and guidelines
  • Identify, analyze, and prioritize Business Continuity (BC) requirements
  • Develop and document scope and plan
  •  Business Impact Analysis (BIA)
  • Alignment of security function to business strategy, goals, mission, and objectives
  • Organizational processes (e.g., acquisitions, divestitures, governance committees)
  • Organizational roles and responsibilities
  • Security control frameworks
  • Due care/due diligence
  • Cyber crimes and data breaches
  • Licensing and intellectual property requirements
  • Import/export controls
  • Trans-border data flow
  • Privacy
Week – 8 Module 8:

  • Describe vulnerability assessment
  • Describe about vulnerability management life cycle (vulnerability assessment
  • Understand different approaches of vulnerability assessment solutions
  • Describe different characteristics of good vulnerability assessment solutions
  • Explain different types of vulnerability assessment tools
  • Choose an appropriate vulnerability assessment tool
  • Understand vulnerability scoring systems
  • Use various vulnerability assessment tools
  • File Blocking
  • SSL Decryption
  • Advanced Malware Protection (AMP)
  • AMP for Network
  • AMP for Content
  • AMP for Endpoint
  • Security Intelligence
  • Motivational Lecture(For further detail please see Page No: 3& 4)
  • Describe the Hacking Methodology
  • Explain different techniques to gain access to the system
  • Apply privilege escalation techniques
  • Explain different techniques to create and maintain remote access to the system
  • Describe different types of rootkits
  • Explain steganography and steganalysis techniques
  • Apply different techniques to hide the evidence of compromise
  • Perform system hacking penetration testing
  • Correlation Policy in FTD
  • Intrusion Detection and Prevention (IPS) / SNORT Rules
  • FirePOWER Reporting
  • Real-time events & Logging
  • How to stay anonymous
  • Counter Measure for end point security
  • Module Level Practical Assignment & Demonstration Activity.
Week – 9 Module 9:

  • Legal Agreement between the trainees and the institute for ethical use of taught tools
  • Describe the concepts of malware and malware propagation techniques
  • Describe the concepts of Trojans, their types, and how they infect systems
  • Explain the concepts of viruses, their types, and how they infect fi
  • Explain the concept of computer worms
  • Perform malware analysis
  • Explain different techniques to detect malware
  • Apply malware countermeasures
  • Perform malware penetration testing
  • SSL Decryption
  • Cisco Web Security Appliance (WSA)
  • Features and Functionality
  • Install and Verify the Cisco WSA in various deployment scenarios
  • Deploying WSA Proxy Services
  • Describe the sniffing concepts
  • Explain different MAC attacks
  • Explain different DHCP attacks
  • Describe the ARP poisoning
  • Explain different MAC spoofing tracks
  • Describe the DNS poisoning
  • Use different sniffing tools
  • Apply sniffing countermeasures
  • Apply various techniques to detect sniffing
  • Perform sniffing penetration testing
  • Utilizing WSA Authentication
  • Configuring WSA Policies
  • Enforcing Acceptable Use
  • Defending Against Malware
  • Data Security Features
  • Module Level Practical Assignment & Demonstration Activity.
Week – 10 Module 10:

  • Perform Mining Blockchain
  • Describe the social engineering concepts
  • Perform social engineering using various techniques
  • Describe insider threats
  • Perform impersonation on social networking sites
  • Describe identity theft
  • Apply social engineering countermeasures
  • Apply insider threats and identity theft countermeasures
  • Perform social engineering penetration testing
  • Cisco Email Security Appliance (ESA)
  • Features and Functionality
  • Deployment Options
  • Administering the Cisco Email Security Appliance
  • Email Security Pipeline
  • Describe the DoS/DD0S concepts
  • Perform DoS/DDOS using various attack techniques
  • Describe Botnets
  • Describe DoS/DDOS case studies
  • Explain different DoS/DDoS attack tools
  • Apply best practices to mitigate DdoS/DD0S attacks
  • Perform DoS/DDOS penetration testing
  • Controlling Sender and Recipient Domains
  • Controlling Spam with Cisco SensorBase and Antispam
  • Using Antivirus, Advanced Malware Protection, and Virus Outbreak Filter
  • Using Mail Policies
  • Using Content Filters
  • Preventing Data Loss
  • Module Level Practical Assignment & Demonstration Activity.
Week – 11 Module 11:

  • Describe the session hijacking concepts
  • Perform application-level session hpcing
  • Perform network level session hijacking
  • Apply different session hijacking tools
  • Apply session hijacking countermeasures
  • Web Application & Penetration testing Concept
  • Attack Vectors
  • Web Application vulnerability reporting tools & counter measure
  • Perform session hijacking penetration testing
  • Cisco Identity Services Engine
  • Cisco ISE Architecture
  • ISE Deployment Models
  • Implementation / Bootstrapping
  • Identity Management
  • Concept of iOT
  • iOT Hardware
  • Project with Arduino
  • Ducky Scripts
  • iOT Hacking
  • Cisco ISE Policy
  • Cisco ISE as a TACACS+ Server for Device Administration with Command Authorization
  • Cisco ISE BYOD Process / Flow
  • Module Level Practical Assignment & Demonstration Activity.
Week – 12 Module 12:

  • Describe IDS, firewall, and honeypot concepts
  • Use different IDs, firewall and honeypot solutions
  • Explain different techniques to bypass IDS
  • Explain various techniques to bypass firewalls
  • Use different IDS/firewall evading tools
  • Explain different techniques to detect honeypots
  • Apply IDS/firewall evasion countermeasures
  • Configuring My Devices Portal Settings
  • Configuring Certificates in BYOD Scenarios
  • High Availability Distributed deployment
  • MDM Integration
  • ISE Profiling Services
  • Endpoint compliance services
  • Hacking web servers
  • Describe the web server concepts
  • Perform various web server attack
  • Describe about web server attack methodology
  • Use different web server attack tools
  • Apply web server attack countermeasures
  • Describe the patch management concepts
  • Use different web server security tools
  • Perform web server penetration testing
  • Describe wireless concepts
  • Explain different wireless encryption algorithms
  • Describe wireless threats
  • Describe wireless hacking methodology
  • Use different wireless hacking tools
  • Describe Bluetooth hacking techniques
  • Apply wireless hacking countermeasures
  • Use different wireless security tools
  • Perform wireless penetration testing
  • Module Level Practical Assignment & Demonstration Activity.
Week – 13 Module 13:

  • Firewall logs
  • System logs
  • Logs Server
  • Monitoring Tools
  • Motivational Lecture (For further detail please see Page No: 3& 4)
  • Describe wireless concepts
  • Explain different wireless encryption algorithms
  • Describe wireless threats
  • Describe wireless hacking methodology
  • Use different wireless hacking tools
  • Describe Bluetooth hacking techniques
  • Apply wireless hacking countermeasures
  • Use different wireless security tools
  • Perform wireless penetration testing
  • Client posture services and provisioning
  • Web Authentication and Guest services
  • Module Level Practical Assignment & Demonstration Activity.
Week – 14 Module 14:

  • Security Architecture and Engineering
  • Implement and manage engineering processes using secure design principles
  • Understand the fundamental concepts of security models
  • Select controls based upon systems security requirements
  • Understand security capabilities of information systems (e.g., memory protection, Trusted
  • Platform Module (TPM), encryption/decryption)
  • Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements
  • Assess and mitigate vulnerabilities in web-based systems
  • Assess and mitigate vulnerabilities in mobile systems
  • Assess and mitigate vulnerabilities in embedded devices
  • Apply cryptography
  • Apply security principles to site and facility design
  • Implement site and facility security controls
  • Wiring closets/intermediate distribution facilities
  • Server rooms/data centers
  • Media storage facilities
  • Evidence storage
  • Restricted and work area security
  • Utilities and Heating, Ventilation, and Air
  • Conditioning (HVAC)
  • Environmental issues
  • Fire prevention, detection, and suppression
  • Module Level Practical Assignment & Demonstration Activity.
Week – 15 Module 15:

  • Identity and Access Management (IAM)
  • Control physical and logical access to assets
  • Information Systems, Devices, Facilities
  • Manage identification and authentication of people, devices, and services
  • Integrate identity as a third-party service
  • Implement and manage authorization mechanisms
  • Manage the identity and access provisioning lifecycle
  • User access review, System account access review
  • Provisioning and deprovisioning
  • Identity management implementation
  • Single/multi-factor authentication
  • Accountability
  • Session management
  • Registration and proofing of identity
  • Federated Identity Management (FIM)
  • Credential management systems On-premises, Cloud, Federated
  • Role Based Access Control (RBAC)
  • Rule-based access control
  • Mandatory Access Control (MAC)
  • Discretionary Access Control (DAC)
  • Attribute Based Access Control (ABAC)
  • Module Level Practical Assignment & Demonstration Activity.
Week – 16 Module 16:

  • NAVIGATING THE DEEP & DARK WEB
  • Exploring the Surface, Deep & Dark Web
  • Ethics and Legality
  • The Onion Router (TOR)
  • The Hidden Internet Project (I2P)
  • Deep & Dark Web Search Engines
  • CRIME ON THE DARK WEB
  • The Hidden Wiki
  • Dark Markets
  • Drugs on the Dark Web
  • Weapons & Hitmen on the Dark Web
  • Fake Documents on the Dark Web
  • Human Trafficking & Sexual Exploitation on the Dark Web
  • DIGITAL CURRENCY
  • Cryptocurrencies
  • Blockchain / Bitcoin
  • Module Level Practical Assignment & Demonstration Activity.