International Certification | Leader in Digital Transformation | Professional Development | Consultation
Cyber Security Attack / Defend Strategist (CSAD)
Classroom Session: 9:30am to 5:30pm (SGT / UTC +8) 3 Lessons (Click on preferred date to register)
Cyber Security Attack / Defend Strategist (CSAD) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
It is preferred that participants successfully completed and receive a Certificate of Competency in Cyber Security Essentials (CSE) .
Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Attack / Defend based on the syllabus covered.
Participants will be awarded a Certificate of Competency and recognized as a Cyber Security Attack / Defend Strategist (CSAD) upon meeting the requirements and passing the examination.
Building a Hacking Lab
Participants will be introduced the latest advancement of Cyber Security Concepts. Participants will also acquire knowledge on how to install / setup Kali Linux (Attacker), Vulnerable Virtual Machines (Target), Cloud Computing and Virtualization concepts.
Introduction to Real-World Hacking
Kali Linux VM Configuration
Configure Vulnerable VMs
Cloud VM vs Container
In the process of hacking, it is an important to hide your identity or achieving anonymity. Anonymity will allow you to do things on the internet invisibly
Acquire essential knowledge on how to perform opensource intelligence on enumerate sensitive information of Target to make the process of hacking look seamless.
Internet Archives / WHOIS / Netcraft
Google Hacking Database & Shodan
Network Scanning Methodology
Identify Live Hosts & Port Scanning
Enumerating Sensitive Information
In this module, participants will learn how to perform different types of password attacks, including cracking hashes and brut-force.
Password Cracking Tools
Cracking the Hashes
Participants will understand the different types of malware and how attackers are distributing malware using undetectable to security devices
Type of Malware
Creating & Distributing Malware
Art to Avoiding Detection
Social Engineering Attack
Discover popularly techniques used to perform attacks like sniffing, MITM, spoofing and phishing using social engineering. This increases the ease of conducting a mass attack surface area.
Sniffing & Spoofing Attack
Phishing & Spear Phishing Attack
Social Media Phishing
Web Based Delivery
Hacking Web Server & Database
Web Servers and Database technologies are widely used everywhere and most of them are vulnerable. In this module, participants will learn how to identify vulnerabilities and mitigation.
Basic WEB Technologies
OWASP Top 10
Hacking WEB Server
SQL Injection Methodlogy
SQL Injection Tools
Open and Free WIFI Access Points / Network are often used by hackers to spy on sensitive data of users. In this module, participants will gain an in-depth understanding on how to to securely use and configure wireless networks.
WPA / WPA2 Attack
Rogue Access Points
Evading IDs, Firewalls and Honeypots
100% security is only marketing strategies. Learn how hackers bypass security domains of targets. Participants will also learn how to harden / defend IT infrastructure through extensive practical / hands-on exercises.