Overview
Course Description
The Tek-z cyber security course is designed to arm you with in-demand cyber security certifications, practical skills in vulnerability assessment, ethical hacking, and defense strategies. This cyber security course online provides learners with flexible cyber security training led by seasoned professionals and hands-on experience through online classes for cyber security.
What you'll learn
- Principles of cyber security and threat landscape
- Ethical hacking and penetration testing
- Network & application security
- Security operations and incident response
- Security compliance and best practices
- Preparation for leading cyber security certifications
Course Features:
- Cyber security certifications course guidance
- Virtual labs and real-world security scenarios
- Cyber security training online with interactive challenges
- Career mentorship and resume building
- 24/7 access to learning resources
Course Content
Definition, importance, and scope
Types of Cyber Threats
Basic Concepts of CIA
Cybersecurity Ethics, Principles and Best Practices
Basic commands
Networking commands
Service and logs.
System Administration Commands
Linux File system / Directory’s
Access Control Types, Permissions, and UAC
Windows Firewall and Windows Defender
Windows Remote Management and RDP
Basic CMD Commands and Batch Scripting
Introduction to PowerShell
Using CMD and PowerShell for System
Administration and Basic Security Tasks
Types of networks
Understanding network topologies
Introduction to Network Protocols and Ports
IP Addressing and Subnetting
Firewall and its configuration.
Footprinting, Reconnaissance, and Enumeration
Vulnerability Assessment and Reporting
Windows and Linux System Hacking
Password Cracking and hashing
Wireshark and Network testing
Wireless Network Hacking
Digital Forensics
Cloud Computing and Security AWS/Azure
Tor, Anonymous and Proxy service’s
Introduction to Web Hacking
Introduction to Burp Suite
Fuzzing & Directory Enumeration
Subdomain Enumeration
Authentication Bypass
File inclusion Vulnerability
File upload vulnerability
Cross-site Scripting XSS
Command Injection
Sql Injection
OWASP TOP 10-2021
Security Operations Center (SOC)
Security Incident and Event Management SIEM)
Tools, installation, and configuration
Building IDS, Firewalls, and Honeypots
Deployment and monitoring
Documenting and Reporting.
Blue Team Defense.
Red Team Offensive testing
Purple Team Organization Task.
OWASP TOP 10-2021
Attacking real world Vulnerable Service’s
Testing web application for Vulnerability Finding
Anonymity, Dark web, and secure communication.
Comprehensive Security Checklists for Auditing,testing