
Cyber Security
The Cyber Security training is targeted to engineers and technical personnel involved in deploying, implementing, operating, optimizing and maintaining Network Security, Server Security, Data & Information Security, Web Application Security, Red & Blue Teaming, Threat & Malware Analysis both in enterprise infrastructure and Web Service environments, including advanced feature like CTF Challenges and security in real world scenarios. The Cyber Security covers a breadth of topics like enumeration, vulnerability assessment & penetration testing, Security Logging, SOC Operations, DLP, SIEM Implementation, malware analysis and blockchain fundamentals. Cyber Security is a lab-intensive course and objectives are accomplished mainly through hands on learning.

Cyber Security
The Cyber Security training is targeted to engineers and technical personnel involved in deploying, implementing, operating, optimizing and maintaining Network Security, Server Security, Data & Information Security, Web Application Security, Red & Blue Teaming, Threat & Malware Analysis both in enterprise infrastructure and Web Service environments, including advanced feature like CTF Challenges and security in real world scenarios. The Cyber Security covers a breadth of topics like enumeration, vulnerability assessment & penetration testing, Security Logging, SOC Operations, DLP, SIEM Implementation, malware analysis and blockchain fundamentals. Cyber Security is a lab-intensive course and objectives are accomplished mainly through hands on learning.
Course Introduction
These 60 hours of (Lectures + hands-on Lab) Cyber Security training is targeted to engineers and technical personnel involved in deploying, implementing and operating optimizing and maintaining Network Security, Server Security, Data & Information Security, Web Application Security, Red & Blue Teaming, Threat & Malware Analysis both in enterprise infrastructure and Web Service environments, including advanced feature like CTF Challenges and security in real world scenarios. The Cyber Security covers a breadth of topics like enumeration, vulnerability assessment & penetration testing, Security Logging, SOC Operations, DLP, SIEM Implementation, malware analysis and blockchain fundamentals. Cyber Security is a lab-intensive course and objectives are accomplished mainly through hands-on learning.
The key to a high success rate is based on the program’s objectives as follows:
- Course contents are based on the latest Cyber Security trends GIAC Security Essentials, Offensive Security, McAfee ePolicy Orchestrator Administration, and Blockchain Council.
- Dedicated Monitoring to evaluate and report candidate’s progress
- Extensive hands-on lab exercises
- Industry acclaimed, experienced and certified instructors
Course Highlights
- Project manager can be assigned to track candidates’ performance
- Curriculum based on course outlines defined by latest Cyber Security trends and GIAC Security Essentials, Offensive Security, McAfee ePolicy Orchestrator Administration and Blockchain Council.
- This Instructor-led classroom course is designed with an aim to build theoretical knowledge supplemented by ample hands-on lab exercises
- Facility of Lab on cloud available (based on booking)
- Courseware includes reference material to maximize learning.
- Assignments and test to ensure concept absorption.
- Courseware includes reference material to maximize learning.
- Assignments and test to ensure concept absorption.
- Repeating of lectures allowed (based on seat availability)
Course Objectives
- Identify, describe, and enumerate the vulnerabilities of different servers.
- Understand and configure dependencies in Kali Linux to prepare for an attack
- Describe the features and functions of different software & frameworks used in cyber security.
- Describe All Next Generation Features including Intrusion Prevention, SSL impersonation, Data Security, advanced enumeration, exploitation, and creating malware
- Perform different types of attacks on different types of servers providing different services
- Configure Basic IDS server
- Implement and manage intrusion policies
- Perform password cracking attacks.
- Perform an initial network discovery, using different tools to identify hosts, applications, and services
- Perform different Server-Side attacks like server-side scripting, LFI, RFI using different exploits
- Perform Client-Side attack using malware drops
- Describe threat defense technologies
- Configure and perform data classification with different techniques
- Installation and configuration of endpoint protection software server.
- Configure and test and manage DLP policies for data in use, data in motion and data in rest.
- Deploying, monitoring, managing & updating security software like antivirus, DLP Policies on multiple systems remotely using agents.
- Analyze the behavior, usage, and implementation procedure for security devices and other data using custom log generation and analysis for SOC operations.
- Describe and explain Threat intelligence
- Understand the working of threat intelligence and analytics using unified dashboards to identify threats and reduce the impact of security incidents.
- Describe the concepts of blockchain fundamentals
- Perform malware analysis
- Perform Web App attacks like SQL injection, Apache tomcat exploit other web services
Course Topics
This course is created to impart knowledge and skills related to security fundamentals, network access, information security, web application security and malware analysis. This course will help candidates prepare to tackle real world cyber security incidents. The following topics are general guidelines to better reflect the contents of the course and for clarity purposes, the guidelines below may change at any time without notice.
- Cyber Security Introduction & Overview
- Examining Cyber Security concepts and current trends
- Cyber Security Fields and Components
- Examining widely used Security Platforms
- Examining widely used Security Software Licensing
- Cyber Security Implementation Use Cases
- Cyber Attacks
- Understanding Kali Linux
- Understanding Attack Preparation Guidelines
- Reconnaissance and Foot Printing using various tools
- Network, host, and services scan & discovery using various tools
- Enumeration using NMAP
- Vulnerability Assessment
- Exploitation using MSF and various other techniques
- Post Exploitation using various techniques
- Data Security
- Data Gathering
- Data Classification
- Users, Roles & Permission
- Policy Development
- Splunk
- Understanding Splunk Architecture
- Understanding Splunk Use Cases
- Installing Splunk on Windows
- Adding Linux Logs to Splunk
- Adding Windows Logs to Splunk
- Understanding Splunk Search Head
- Understanding Splunk Forwarder
- Understanding Splunk Indexer
- Understanding Splunk Deployment server
- McAfee ePO
- Installation of McAfee ePO Server
- Configuring McAfee ePO Dashboards
- Product Installation
- Software & Repository Management
- System Tree
- Policy Catalog
- User Management
- AAA
- Active Directory Synchronization
- DLP
- Agent-Server Communication
- Agent Deployment
- Policy development
- Pushing Policy and Software using agents
- Queries & Reports
- Blockchain Fundamentals
- What is Blockchain
- Byzantine General Problem
- Gartner Hype Curve
- How Blockchain Works
- Why Blockchain
- Mining Page
- Transaction Life Cycle
- Types of network
- Cryptography and Hashing
- Blockchain Vocabulary
- Block number, Nonce, Hash, Timestamp, Merkle root
- Transaction, Transaction Fee, Merkle Tree
- Mining, Block Reward, Soft fork
- Fork
- Longest Chain Wins
- Orphan Bloc
- Block Hash
- Test Network, Main Network
- Double spending attack, Sybil attack, 51%attack
- Practical Byzantine Fault Tolerance (PBFT)
- Cryptocurrency: Bitcoin and Ethereum
- World of Cryptocurrency
- Bitcoin
- Smart Contracts
- Solidity gas overview
- Types and Applications of Blockchain
- Types of blockchain
- Applications of Blockchain
- Bitcoin core Blockchain
- Wallets in Blockchain
Lab Topics
Cyber Attacks
- Cyber Attacks
- WordPress Malicious Plugin Upload
- Brute Force Password Attacks
- Command Injection
- Cross Site Request Forgery
- Local & Remote File Inclusion
- Exploiting File Upload Vulnerability
- SQL Injection
- XSS DOM Based
- XSS Reflected
- XSS Stored
- JS Token manipulation
- CSP Bypass
- Apache Tomcat Authenticated Code Upload Execution
- Apache Struts 2 REST XML RCE
- Jenkins Groovy Script Console RCE
- Linux Privilege Escalation
- Windows AD
- Windows SMB – Ransomware
- Windows Kerberos Attack
- Windows Client
- Windows Privilege Escalation
- Lateral Movement
Cyber Defense: (Demonstration Only)
- Splunk:
- Installation on Linux
- Installation on Windows
- Configuration
- Add Windows Logs to Splunk
- Add Linux Logs to Splunk
- McAfee ePO:
- Installation of McAfee ePO Server
- Configuring McAfee ePO Dashboards
- Product Installation
- Software & Repository Management
- System Tree
- Policy Catalog
- User Management
- DLP
- Agent-Server Communication
- Agent Deployment
- Policy development
- Pushing Policy and Software using agents
- Malware Analysis:
- Deploying IDS Server
- Vulnerability Assessment
- Reverse Engineering sample malware
Virtual Classroom
- Instructor led online training is an ideal vehicle for delivering training to individuals anywhere in the world at any time.
- This innovative approach presents live content with instructor delivering the training online.
- Candidates will be performing labs remotely on our labs on cloud in presence of an online instructor.
- Rstforum uses microsoft lync engine to deliver instructor led online training.
- Advances in computer network technology, improvements in bandwidth, interactions, chat and conferencing, and realtime audio and video offers unparalleled training opportunities.
- Instructor led online training can helps today’s busy professionals to perform their jobs and upgrade knowledge by integrating self-paced instructor led online training in their daily routines.
Miscellaneous
- Minimum batch size required for batch is 10 participants in the this course.
- The RST Forum reserves the right to cancel/postpone the class.
- Course schedule will be provided before commencement of the course.
- Certificate of participation will be awarded to participants with a minimum 90% attendance.
- All attendees are to observe the Copyright Law on intellectual properties such as software and courseware from respective vendors.
- The RST Forum reserves the right to include external participants in the program either for the entire course or individual courses.
- The RST Forum reserves the right to change/alter the sequence of courses. RST FORUM published Book would be given at 50% discounted rate to the forum students.