Course Content
View Course Modules
0/1
Cybersecurity

Part 1: Windows System Core Level

Module 1: Installing and Configuring Domain Controllers

  • Overview of AD DS

  • Overview of AD DS Domain Controllers

  • Deploying a Domain Controller

  • Deploying AD DS

  • Deploying Domain Controllers by Cloning

  • Administering AD DS

Module 2: Managing Objects in AD DS

  • Managing User Accounts

  • Managing Groups in AD DS

  • Managing Computer Objects in AD DS

  • Using Windows PowerShell for AD DS Administration

  • Implementing and Managing Organizational Units (OUs)

Labs

  • Lab: Managing AD DS Objects

    • Creating and managing groups in AD DS

    • Creating and configuring user accounts in AD DS

    • Managing computer objects in AD DS

  • Lab: Administering AD DS

    • Delegating administration for OUs

    • Creating and modifying AD DS objects with Windows PowerShell


Part 2: Network System Core Level

Module 1: Building a Simple Network

  • Exploring the Functions of Networking

  • Understanding the Host-to-Host Communication Model

  • Introducing LANs

  • Operating Cisco IOS Software

  • Starting a Switch

  • Understanding Ethernet and Switch Operation

  • Troubleshooting Common Switch Media Issues

Module 2: Establishing Internet Connectivity

  • Understanding the TCP/IP Internet Layer

  • Understanding IP Addressing and Subnets

  • Understanding the TCP/IP Transport Layer

  • Exploring the Functions of Routing

  • Configuring a Cisco Router

  • Exploring the Packet Delivery Process

  • Enabling Static Routing

  • Managing Traffic Using ACLs

  • Enabling Internet Connectivity

Module 3: Implementing DNS

  • Implementing DNS Servers

  • Configuring DNS Zones

  • Configuring Name Resolution Between DNS Zones

  • Configuring DNS Integration with AD DS

  • Configuring Advanced DNS Settings

  • Troubleshooting DNS

Labs

  • Lab: Planning and Implementing Name Resolution Using DNS

    • Planning DNS name resolution

    • Implementing DNS servers and zones

  • Lab: Integrating DNS with Active Directory

    • Integrating DNS with AD DS

  • Lab: Configuring Advanced DNS Settings

    • Configuring DNS policies

    • Validating DNS implementation


Part 3: Linux System Core Level

  • Linux Command Basics

  • Navigating Directories

  • Getting Help in Linux

  • Creating, Copying, Moving, and Removing Files/Directories

  • Editing Files with VIM

  • Using Wildcards to Speed Up Tasks

  • Managing Users and Groups

  • Managing File Permissions

  • Command Redirection and Output Control

  • Managing Services

  • Networking Basics

  • Archiving Files and Directories

  • SSH Access

  • Downloading, Installing, Updating, and Managing Software Packages from:

    • Package Repositories

    • GitHub


Part 4: Ethical Hacking (CEHv11)

  • Introduction to Ethical Hacking

  • Footprinting and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service (DoS)

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT and OT Hacking

  • Cloud Computing Security

  • Cryptography


Part 5: Capture The Flag (CTF)

What is CTF?

CTF is a hands-on cybersecurity competition format designed to develop offensive and defensive security skills.

Common CTF Types

  1. Jeopardy-Style CTF

    • Task-based challenges in areas such as Web, Forensics, Crypto, and Binary

    • Teams gain points for each solved challenge

    • Higher difficulty challenges award more points

  2. Attack-Defence CTF

    • Each team has its own vulnerable network/services

    • Teams must defend their own systems and attack opponents

    • Scoring combines defense points and attack points

  3. Mixed CTF

    • Combination of Jeopardy and Attack-Defence formats