CYBER SECURITY
Cyber Security Course Curriculum
This programme will help you align your learning to your professional goals; whether you’re looking to build a career in cybersecurity, or grow as a leader in strategic roles.
CYBER SECURITY Training at Colorminds.
- Gain theoretical knowledge & practical understanding with this cutting-edge curriculum.
- Build a strong network for life with opportunities to connect to Cyber Security Industry experts.
- Learn multiple tools & languages to stand apart to gain a foothold in the Cyber Security industry.
Who can enroll in this Course?
CYBER SECURITY Training Course is designed to benefit all professionals looking to start their career as Cyber Security Expert, Cyber Security Engineer , Cybersecurity Analyst, Application Security Engineer, Network Security Engineer. or to expertise more in the current domain. However, this course will be suitable for:
- Graduates looking for a Successful Career in Cyber Security.
- IT and Technology Professionals, Project Leads and Managers in IT/Tech Companies, Tech Support Engineers and Admins.
- Existing employees looking for a better role to prove to their employers the value of their skills through this certification.
Qualification Requirements:
- Candidates who have a degree in the field of B.Tech, MCA and M.Sc

- Introduction to Information Security
- Introduction to Computer Networks
- The OSI Model
- TCP/IP Model
- Understanding IP/ICMP
- Network Basics
- IPV4 & IPV6
- VLAN
- Router Security-NAT
- VPN and ACL
- Advanced Networking Concept
- Network Packet Analysis (Wireshark)
- Understanding things in the packet layer
- Windows & Linux Basics
- Windows system architecture – Windows 7 Architecture
- Windows Server
- Linux Basics (Introduction to Linux file system architecture) and Commands
- Reconnaissance
- Finding Vulnerabilities – Manual methods
- Vulnerability Assessment (VA)
- Penetration testing
- Enumeration of services
- Finding Vulnerabilities – Automated methods
- Nessus Vulnerability scanner
- Getting exploit code – Exploitation Framework (msf)
- Attacking Linux and Windows
- Network Security Auditing/ Wireless
- Architecture Review
- Device Auditing
- Configuration Review-Nipper
- Firewall Rule based Auditing
- Wireless Security
- WLAN Risk and Attack Taxonomy
- Setting up the Aircrack-ng Kung-Fu, Cloaking Hidden SSID
- Cracking WPA/WPA2 PSK, Evil Twin
- Shell scripting
- Shebang/Hashbang, Shell script invocation
- Integrating Linux command with shell scripts
- Execute permission, chmod, using variable, quotes, Special Variables, environment variables,
- Shell Basic Operators, Decision Making, Functions, Shell Metacharacters, Shell script with I/O operations, Loops and statements, Arrays.
- Concept of piping, Working with functions, String Function, File Handling and Regular Expressions
- Database Security
- Database Fundamentals
- Database Management System -DBMS and RDBMS
- Database Administrator, Database Security Issues,
- Auditing in Database
- Windows Security
- Introduction to windows security architecture
- Group Policy Objective, User profiles
- File permission
- Event Log
- Windows General Security Practices
- Windows Auditing
- Linux server security
- Boot Security, Patching Linux Kernel
- Strong Password policy, Process Security, Securing Root Login, Altering Process schedule
- The Linux Security Model – Users and Groups, Linux File Security, Index nodes (Inodes)
- OS hardening-CIS Benchmark & Exercises
- Introduction to Applications
- OWASP Top 10
- Using Application Proxies- Burp-suite
- WASC-Web Application Security Consortium
- Risk Based Security Testing (Business Logic Testing)
- Threat Modelling
- Source Code Analysis
- Android Basics
- Android Security Architecture
- Connecting to Android Device
- Reverse engineering Android Apps
- Android Exploitation
- OWASP Top 10 Vulnerabilities.
- Introduction to iOS
- iOS Security Architecture & Mechanisms
- Jailbreaking
- Connecting to the device
- Dynamic and Static Analysis
- SOC
- Security Operation Centre Concepts
- Designing SOC
- Introduction to Forensics & Incident Response
- Legal Issues, chain of custody
- Cyber Crime
- Tools and Techniques
- Digital Forensics in different scenarios
- Incident response
- Live Response
- Disk Forensics
- Memory acquisition
- File System Fundamentals
- Understanding Evidence file formats, Hard Disk, Password cracking, Physical Protection of Evidence
- Disk Forensic Analysis-Encase Forensic Analysis
- Memory Forensics- Volatility Framework
- Network Forensics
- Case studies
- ISMS
- Introduction to Compliance, Definitions
- Risk Management
- ISMS-ISO 27001:2013
- BCM
- Business Continuity Management: ISO 22301
- PCI-DSS
- Auditing Exercises