Day 1
1. Introduction to Security
Information Security, Cyber Security, and Cybercrime
Definition
Differences between them
Importance of cybercrime in day-to-day life
Trinity of IT Sec – CIA
Hacking
Introduction – hacking and hackers
Types of hackers
Hacking methodologies
What Is not hacking
OSI Layers
Introduction
OSI Layers – Detailed explanation
Protocols
What are protocols
Usage and importance of protocols
Protocols in each OSI Layer
Types of Attacks and Malware
Attacks: Introduction, followed by
Denial of Service (DOS) and Distributed Denial of Service (DDoS)
Man in the Middle Attack (MitM)
Bots and Botnets
Phishing
Drive-by Downloads
Brute Force/ Password Attacks
SQL Injection
Cross-site Scripting (XSS)
Information Gathering
Footprinting
Scanning
Malware: Introduction, followed by
Virus and worms
Trojans
Adware and Spyware
Backdoor and Info stealer
Rootkits
Ransomware
Anonymizers, Proxies, VPN, Tor and Dark web
Anonymizers
Proxies
VPN
Tor
Darkweb
Day 2
Network Sniffing and DOS
Introduction – Definition, Importance, Usage
Wireshark – Network Sniffer
Packet Capturing
4.3.1 Password capture by Packet capturing
Burp Suite
DOS
Defense Mechanisms
Introduction
Antivirus
Encryption
Firewall
Biometrics
Factor authentication methods
Honeypots and DMZs
Security for Wireless Devices
Password Management
Internet Security
Internet Privacy, Anonymity, etc.
Identity/Identification Strategies
How can we be tracked online?
Places you are tracked
How do cookies play an important role in user tracking?
Incognito mode
Other methods to hide your internet activity
Email Security
Email Basics, Ports, and Protocols
Tracking Sent Emails
Detection of Email tracking
Major attacks through Email (Phishing and Scams)
Day 3
Backup and Storage Security
Importance of Data Storage and Backup
Storage Methods
Protection of data using Passwords and their risks
Encryption of data
Encrypting in Win10 using BitLocker
Encrypting in iOS using FileVault
Attacks against Encryption
Mobile Security
Introduction
Android vs Apple devices
Tips to identify Legit/Scam Apps
Understanding App Permissions (Android vs Apple)
Checking App Permissions (Android vs Apple)
Some Mobile Threats – Trojans, Ransomware, Virus, Spyware, etc.
Symptoms that your mobile has been compromised
Sec Apps for mobile Devices
Win 10 Security
Features
Patches and Updates
Privacy Checks
Turning off Ad Tracker
Turning off Location Tracker
- Turning of Peer system downloads
Restricting Data collection by Cortana
Hardening
Randomizing MAC Address
Enabling Defender SmartScreen
Conclusion
General Cyber Security Policies
Myths about Online Security
Mitigation steps to be taken for personal security in the web
Careers in Cyber Security