Cyber Security Attack / Defend Strategist (CSAD)


Cyber Security Attack / Defend Strategist (CSAD) allow participants to understand the importance of Cyber Security, Network Security and latest Cyber Attack based on the latest industry practices. Participants will acquire advanced knowledge on how the latest Cyber Attack can be discovered by using a vast range of techniques. Cyber Security Attack / Defend Strategist (CSAD) will learn essential skills on implementing counter response and preventive measures on Cyber Hacking.

Cyber Security Attack / Defend Strategist (CSAD) provides in-depth Virtualization & Cloud labs using both open-sourced and vendor-centric tools incorporating industry best practices. With intensive hands-on sessions that emulate real-world hacking scenarios, participants will be equipped with the skills to assess organization’s security posture, implement controls to better secure organization’s network infrastructure and strategies to combat against hackers and/or viruses, etc.

Upcoming Batches

  • Singapore: 10 to 12 Oct 2018, 19 to 21 Dec 2018 | Book Now
  • Bangkok, Thailand: 13 to 15 Nov 2018 | Book Now
  • Johor, Malaysia: 7 to 9 Nov 2018 | Book Now
  • Kuala Lumpur, Malaysia: 19 to 21 Sep 2018, 21 to 23 Nov 2018, 26 to 28 Dec 2018 | Book Now
  • Penang, Malaysia: 27 to 29 Nov 2018 | Book Now
Course Objective
Cyber Security Attack / Defend Strategist (CSAD) is designed for anyone interested in acquiring the advanced knowledge and skills required to implementing counter response and preventive measures on Cyber Security.
Course Duration
24 hours / 3-Days
Course Outline
MODULE 1 CYBER SECURITY FUNDAMENTALS  

  • Introduction to the World of Cyber Security
  • Definition of Hacking & Cracking
  • Real-World Hacking
  • MODULE 2:BUILDING YOUR "HACKING LAB"  

  • Virtualization & Cloud fundamentals
  • Building your VM Lab
  • Cloud VM vs Container
  • ISO & Installer preparation
  • Configure Microsoft Windows & Vulnerable VM
  • Kali Linux 2018.2 configuration
  • MODULE 3:KALI LINUX "THE ATTACKER" FAMILIARIZATION  

  • Kali Linux VM & Cloud
  • Kali Linux command
  • Kali Linux configuration
  • Kali Linux troubleshooting
  • MODULE 4:HIDING YOUR IDENTITY - ESCAPE ROUTE  

  • ProxyChains
  • Proxy Server
  • VPN Services
  • TOR Network
  • MODULE 5:FOOTPRINTING AND RECONNAISSANCE (INFORMATION GATHERING)  

  • Intro to Footprinting
  • Hacker Tools Selection
  • Email Harvest
  • Google Hacking
  • Social Media Hacking
  • Metagoofil
  • People Search Engine
  • Maltego
  • OSINT
  • Internet Achieve
  • WHOIS / Netcraft / DNS Recon
  • Shodan
  • MODULE 6:NETWORK SCANNING  

  • Network Scanning Methodology
  • Identify Live Hosts
  • Port Scanning
  • Network Mapping
  • NMAP
  • NMAP NSE Script
  • Zenmap
  • Netcat & NC
  • Vulnerability Scanning
  • Wireshark vs TCPDump
  • MODULE 7:ENUMERATION  

  • NetBIOS Enumeration
  • SNMP Enumeration
  • DNS Enumeration
  • DNS Zone Transfer
  • Enum4linux
  • Getting down with Linux Shell
  • Httpprint
  • Web Server Banners
  • Active Directory Enumeration
  • MODULE 8:PASSWORD CRACKING  

  • Attack Vector
  • Cain in Action
  • Password Cracking Tools
  • Rainbow Tables
  • Cracking the Hashes
  • Sniffing Remote Passwords
  • Wordlists
  • Crunch
  • Cracking with GPU
  • Hashcat
  • MODULE 9:MALWARE THREAT & COUNTERMEASURES  

  • Type of Malware
  • Distributing Malware
  • Creating Virus using Tools
  • Msfvenom & Meterpreter
  • Veil v3
  • SETToolkit
  • ShellCode Generator
  • Trojan
  • Backdoor
  • KeyLogger
  • Avoiding Detection
  • Cloud Scanning Engine
  • Port Monitoring tools
  • Windows OS Protection
  • MODULE 10:SNIFF YOUR VICTIM  

  • MITM definition
  • Routing
  • Mitmf
  • EtterCAP
  • DNS Spoofing attack
  • MITM with WiFi
  • Mana-Toolkit
  • MODULE 11:SOCIAL ENGINEERING ATTACK  

  • SETToolkit
  • Phishing Attack
  • Credit Card Phishing
  • Social Media Phishing
  • Email Phishing & Spam
  • Web Based Delivery
  • Vishing & Smishing
  • Spear Phishing
  • MODULE 12:HACKING WEB SERVER  

  • Hacking Apache Server
  • Hacking Microsoft IIS
  • Denial of Service (DOS)
  • Distributed Denial of Service (DDOS)
  • Working with WEB Exploit
  • Basic WEB Technology
  • OWASP Top10
  • MODULE 13:SQL INJECTION  

  • Vulnerable WEB VM
  • Basic SQL Statement
  • SQL Injection methodology
  • SQLi Tools
  • SQLMAP
  • MODULE 14:WIFI (Wireless) CRACKING  

  • WiFi Encryption
  • WEP attack
  • WPA / WPA2 Attack
  • WiFi Dictionary Attack
  • Rogue AP
  • MODULE 15:EVADING IDS, FIREWALLS and HONEYPOTS  

  • IDS/IPS configuration
  • Honeypots
  • Honeynet Project
  • Firewalls (Subscription vs Opensource)
  • ACL - Access Control List
  • Snort
  • Suricata
  • Pre-Requisite
    NA
    Examination
    Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Attack / Defend based on the syllabus covered
    Certification
    Participants will be awarded a Certificate of Competency and recognized as a Cyber Security Attack / Defend Strategist (CSAD) upon meeting the requirements and passing the examination.
    Who Will Benefit from the Course
    Cyber Security Attack / Defend Strategist (CSAD) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment. Class is limited to 20 participants as hands-on sessions and real-time demonstration is expected.