Upcoming Batch
8 to 10 Feb 2021 Online ‘Live’9:30am to 5:30pm Singapore Timezone
3 Sessions / 24-Hours Apply Now
|
|
8 to 10 Mar 2021 Online ‘Live’9:30am to 5:30pm Singapore Timezone
3 Sessions / 24 Hours Apply Now
|
|
7 to 9 Apr 2021 Online ‘Live’9:30am to 5:30pm Singapore Timezone
3 Sessions / 24 Hours Apply Now
|
|
Course Information
- Duration: 3-Day / 24 Hours
- Certification: Participants will receive a Certificate of Competency upon successfully completing the course and passing the examination
- Who Should Attend: Anyone interested in acquiring knowledge and skills on Cyber Security Attack and Defense strategies
Course Objective
Acquiring the advanced knowledge and technical skills in Cyber Security attacks and defending strategies
Learn how identify potential threats and take preemptive measures to secure cyber assets
Pre-Requisite
It is preferred that participants successfully completed and pass Cyber Security Essentials (CSE)
Examination
Participants are required to attempt an examination upon completion of course. This exam tests a candidate’s knowledge and skills related to Cyber Security based on the syllabus covered
Module 1
Building a Hacking Lab
Participants will be introduced the latest advancement of Cyber Security Concepts. Participants will also acquire knowledge on how to install / setup Kali Linux (Attacker), Vulnerable Virtual Machines (Target), Cloud Computing and Virtualization concepts.
Topics Covered
- Introduction to Real-World Hacking
- Kali Linux VM Configuration
|
- Configure Vulnerable VMs
- Cloud VM vs Container
|
Module 2
Hiding Identity
In the process of hacking, it is an important to hide your identity or achieving anonymity. Anonymity will allow you to do things on the internet invisibly.
Topics Covered
Module 3
Open-Source Intelligence
Acquire essential knowledge on how to perform opensource intelligence on enumerate sensitive information of Target to make the process of hacking look seamless.
Topics Covered
- OSINT
- Internet Archives / WHOIS / Netcraft
- Google Hacking Database & Shodan
|
- Network Scanning Methodology
- Identify Live Hosts & Port Scanning
- Enumerating Sensitive Information
|
Module 4
Password Cracking
In this module, participants will learn how to perform different types of password attacks, including cracking hashes and brut-force.
Topics Covered
- Attack Vector
- Password Cracking Tools
|
- Cracking the Hashes
- Sniffing Password
|
Module 5
Malware Threats
Participants will understand the different types of malware and how attackers are distributing malware using undetectable to security devices.
Topics Covered
- Type of Malware
- Creating & Distributing Malware
|
- Art to Avoiding Detection
|
Module 6
Social Engineering Attack
Discover popularly techniques used to perform attacks like sniffing, MITM, spoofing and phishing using social engineering. This increases the ease of conducting a mass attack surface area.
Topics Covered
- MITM Description
- Sniffing & Spoofing Attack
- Phishing & Spear Phishing Attack
|
- Social Media Phishing
- Web Based Delivery
|
Module 7
Hacking Web Server & Database
Web Servers and Database technologies are widely used everywhere and most of them are vulnerable. In this module, participants will learn how to identify vulnerabilities and mitigation.
Topics Covered
- Basic WEB Technologies
- OWASP Top 10
- Hacking WEB Server
|
- SQL Injection Methodlogy
- SQL Injection Tools
|
Module 8
Wireless Hacking
Open and Free WIFI Access Points / Network are often used by hackers to spy on sensitive data of users. In this module, participants will gain an in-depth understanding on how to to securely use and configure wireless networks.
Topics Covered
- Wireless Basics
- WPA / WPA2 Attack
|
|
Module 9
Evading IDs, Firewalls and Honeypots
100% security is only marketing strategies. Learn how hackers bypass security domains of targets. Participants will also learn how to harden / defend IT infrastructure through extensive practical / hands-on exercises.
Topics Covered
- IDS / IPS Configuration
- Honeypots
|
- Firewalls (Vendor-Centric vs Open Source)
- ACL – Access Control List
|
What Past Participants Say
Course content is excellently designed and delivered, allowing participants to learn at a comfortable pace.
Nur Hisyam
|
|
This course is an eye opener to world of cyber security. It has provided me with greater insights and focus extensively on the technical aspect of Cyber Security.
Joel Zhou
|
|
|
Why CASUGOL
Customization of Programs for specific industry, organisation, government agencies, statutory boards.
Flexible programmes designed to cater to the individual needs of participants, whether for professional upskilling, or for general interest.
|
|
Benefit from contribution from leading Industry Experts, Academics, and Researchers from across the world.
Opportunities for employers to develop their workforce and for individuals to enhance their career.
|
|
Dynamic learning environment that providing participants with professional networking opportunity.
Online support for participants after the training. |
|
Explore More Courses
Need more information?
Let us help if you are planning to advance your career and further your education. Request for more information.
Request for more
|