Cyber Security Attack / Defend Strategist (CSAD)



Cyber Security Attack / Defend Strategist (CSAD) allow participants to understand the importance of Cyber Security, Network Security and latest Cyber Attack based on the latest industry practices. Participants will acquire advanced knowledge on how the latest Cyber Attack can be discovered by using a vast range of techniques. Cyber Security Attack / Defend Strategist (CSAD) will learn essential skills on implementing counter response and preventive measures on Cyber Hacking.

Cyber Security Attack / Defend Strategist (CSAD) provides in-depth Virtualization & Cloud labs using both open-sourced and vendor-centric tools incorporating industry best practices. With intensive hands-on sessions that emulate real-world hacking scenarios, participants will be equipped with the skills to assess organization’s security posture, implement controls to better secure organization’s network infrastructure and strategies to combat against hackers and/or viruses, etc.

Course Information
  • Duration: 3-Day / 24 Hours
  • Who Should Attend: Cyber Security Attack / Defend Strategist (CSAD)is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
Course Objective

Cyber Security Attack / Defend Strategist (CSAD) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.

Pre-Requisite

It is preferred that participants successfully completed and receive a Certificate of Competency in Cyber Security Essentials (CSE) .

Examination

Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Attack / Defend based on the syllabus covered.

Certification

Participants will be awarded a Certificate of Competency and recognized as a Cyber Security Attack / Defend Strategist (CSAD) upon meeting the requirements and passing the examination.

Module 1 Cyber Security Fundamentals
  • Introduction to the World of Cyber Security
  • Definition of Hacking & Cracking
  • Real-World Hacking

    Module 2 Building Your “Hacking Lab”
  • Virtualization & Cloud fundamentals
  • Building your VM Lab
  • Cloud VM vs Container
  • ISO & Installer preparation
  • Configure Microsoft Windows & Vulnerable VM
  • Module 3 Kali Linux “The Attacker” Familiarization
  • Kali Linux VM & Cloud
  • Kali Linux command
  • Kali Linux configuration
  • Kali Linux troubleshooting
  • Module 4 Hiding Your Identity – Escape Route
  • ProxyChains
  • Proxy Server
  • VPN Services
  • TOR Network
  • Module 5 Footprinting and Reconnaissance (Information Gathering)
  • Intro to Footprinting
  • Hacker Tools Selection
  • Google Hacking
  • Social Media Hacking
  • People Search Engine
  • Maltego
  • OSINT
  • Internet Achieve
  • WHOIS / Netcraft / DNS Recon
  • Shodan
  • Module 6 Network Scanning
  • Network Scanning Methodology
  • Identify Live Hosts
  • Port Scanning
  • NMAP
  • NMAP NSE Script
  • Zenmap
  • Vulnerability Scanning
  • Wireshark vs TCPDump
  • Module 7 Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • DNS Enumeration
  • Enum4linux
  • Module 8 Password Cracking
  • Attack Vector
  • Password Cracking Tools
  • Rainbow Tables
  • Cracking the Hashes
  • Sniffing Remote Passwords
  • Wordlists
  • Crunch
  • Cracking with GPU
  • Hashcat
  • Module 9 Malware Threat & Countermeasures
  • Type of Malware
  • Distributing Malware
  • Creating Virus using Tools
  • Msfvenom & Meterpreter
  • Veil v3
  • Trojan
  • Backdoor
  • KeyLogger
  • Avoiding Detection
  • Windows OS Protection
  • Module 10 Sniff Your Victim
  • MITM definition
  • Routing
  • EtterCAP
  • DNS Spoofing attack
  • Mana-Toolkit
  • Module 11 Social Engineering Attack
  • SETToolkit
  • Phishing Attack
  • Credit Card Phishing
  • Social Media Phishing
  • Email Phishing & Spam
  • Web Based Delivery
  • Vishing & Smishing
  • Spear Phishing
  • Module 12 Hacking Web Server
  • Hacking Apache Server
  • Hacking Microsoft IIS
  • Denial of Service (DOS) and Distributed Denial of Service (DDOS)
  • Working with WEB Exploit
  • Basic WEB Technology
  • OWASP Top10
  • Module 13 SQL Injection
  • Vulnerable WEB VM
  • Basic SQL Statement
  • SQL Injection methodology
  • SQLi Tools
  • SQLMAP
  • Module 14 WIFI (Wireless) Cracking
  • WiFi Encryption
  • WEP attack
  • WPA / WPA2 Attack
  • WiFi Dictionary Attack
  • Rogue AP
  • Module 15 Evading IDs, Firewalls and Honeypots
  • IDS/IPS configuration
  • Honeypots
  • Honeynet Project
  • Firewalls (Subscription vs Opensource)
  • ACL – Access Control List
  • Snort