Cyber Security Attack / Defend Strategist (CSAD)

Course Information
  • Duration: 3-Day / 24 Hours
  • Who Should Attend: Cyber Security Attack / Defend Strategist (CSAD)is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.
Course Objective

Cyber Security Attack / Defend Strategist (CSAD) is designed for anyone who have little or no understanding, knowledge of, or experience in Cyber Security and would like the opportunity to learn in a supportive and encouraging environment.

Pre-Requisite

It is preferred that participants successfully completed and receive a Certificate of Competency in Cyber Security Essentials (CSE) .

Examination

Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security Attack / Defend based on the syllabus covered.

Certification

Participants will be awarded a Certificate of Competency and recognized as a Cyber Security Attack / Defend Strategist (CSAD) upon meeting the requirements and passing the examination.


Module 1 Cyber Security Fundamentals
  • Introduction to the World of Cyber Security
  • Definition of Hacking & Cracking
  • Real-World Hacking


  • Module 2 Building Your “Hacking Lab”
  • Virtualization & Cloud fundamentals
  • Building your VM Lab
  • Cloud VM vs Container
  • ISO & Installer preparation
  • Configure Microsoft Windows & Vulnerable VM

  • Module 3 Kali Linux “The Attacker” Familiarization
  • Kali Linux VM & Cloud
  • Kali Linux command
  • Kali Linux configuration
  • Kali Linux troubleshooting

  • Module 4 Hiding Your Identity – Escape Route
  • ProxyChains
  • Proxy Server
  • VPN Services
  • TOR Network

  • Module 5 Footprinting and Reconnaissance (Information Gathering)
  • Intro to Footprinting
  • Hacker Tools Selection
  • Google Hacking
  • Social Media Hacking
  • People Search Engine
  • Maltego
  • OSINT
  • Internet Achieve
  • WHOIS / Netcraft / DNS Recon
  • Shodan

  • Module 6 Network Scanning
  • Network Scanning Methodology
  • Identify Live Hosts
  • Port Scanning
  • NMAP
  • NMAP NSE Script
  • Zenmap
  • Vulnerability Scanning
  • Wireshark vs TCPDump

  • Module 7 Enumeration
  • NetBIOS Enumeration
  • SNMP Enumeration
  • DNS Enumeration
  • Enum4linux

  • Module 8 Password Cracking
  • Attack Vector
  • Password Cracking Tools
  • Rainbow Tables
  • Cracking the Hashes
  • Sniffing Remote Passwords
  • Wordlists
  • Crunch
  • Cracking with GPU
  • Hashcat

  • Module 9 Malware Threat & Countermeasures
  • Type of Malware
  • Distributing Malware
  • Creating Virus using Tools
  • Msfvenom & Meterpreter
  • Veil v3
  • Trojan
  • Backdoor
  • KeyLogger
  • Avoiding Detection
  • Windows OS Protection

  • Module 10 Sniff Your Victim
  • MITM definition
  • Routing
  • EtterCAP
  • DNS Spoofing attack
  • Mana-Toolkit

  • Module 11 Social Engineering Attack
  • SETToolkit
  • Phishing Attack
  • Credit Card Phishing
  • Social Media Phishing
  • Email Phishing & Spam
  • Web Based Delivery
  • Vishing & Smishing
  • Spear Phishing

  • Module 12 Hacking Web Server
  • Hacking Apache Server
  • Hacking Microsoft IIS
  • Denial of Service (DOS) and Distributed Denial of Service (DDOS)
  • Working with WEB Exploit
  • Basic WEB Technology
  • OWASP Top10

  • Module 13 SQL Injection
  • Vulnerable WEB VM
  • Basic SQL Statement
  • SQL Injection methodology
  • SQLi Tools
  • SQLMAP

  • Module 14 WIFI (Wireless) Cracking
  • WiFi Encryption
  • WEP attack
  • WPA / WPA2 Attack
  • WiFi Dictionary Attack
  • Rogue AP

  • Module 15 Evading IDs, Firewalls and Honeypots
  • IDS/IPS configuration
  • Honeypots
  • Honeynet Project
  • Firewalls (Subscription vs Opensource)
  • ACL – Access Control List
  • Snort