Join With Our Courses To Develop Yourself.
Yami Cosmo Services is the place to start for all people interested in advancing their cyber security education.
IT security training in YCSPL provides the best knowledge along with specific practices that should be kept in practice to ensure information security of the organization, software, website or app etc.This Cyber Security course at YCSPL offers the best security courses in the market today.
Cyber Security is one on the biggest threat as well as opportunity in the contemporary world. The exponential rise in the volume, veracity and variety of cyber-crime cases has to be matched with appropriate detection and response mechanism. To achieve this, there has to be a significant increase in cyber security professionals.
An overall awareness of the branches of cyber security, various technologies used, career paths. It also with the phases in which a security breach takes place and the skills that a good security professional should possess.
Cyber Laws and Standards
This chapter introduces the trainees with cyber laws of India and various sections within. It also elaborates on the applicable penalties and punishments. The chapter also covers compliances which are prevalent in today’s world and are slowly becoming a mandatory requirement for most organisation.
It covers the basics of networking as required for clearly understanding the forthcoming chapters. It covers all necessary layers (Application, Transport, Network and Physical), all necessary components like Hubs and switch-es followed by a detailed discussion on protocols like TCP, UDP, ARP, SSH, PPP, TOR etc.
It covers hashing techniques like SHA, MD5; Digital Signatures, SSL, TLS, PGP. It also covers encryption tech-niques like RSA, AES, DES, 3-DES. Lastly, it covers some tools used for encryption and hashing.
Involves collecting data about the target using non-intrusive methods like google searching, search on Facebook, LinkedIn, twitter etc. It also covers DNS search, People search, searching for hacked devices, hacking routers printers etc.
Teaches TCP and UDP based scans to perform Port scanning, OS scanning and network scanning. This chapter discusses how to enumerate the processes running on the any server, number of active hosts in a network, version and model of the running OS on a server
It covers IP spoofing, followed by MAC address spoofing. It also covers how cyber criminals make fake calls, fake messages and fake SMSs, ARP and DNS Spoofing. Lastly it discusses the impact and legal standing of spoofing techniques.
Deals with three prominent OS: Windows, Linux and Mac OS. This chapter instructs how these systems can be hacked in both close and open states, how malwares like viruses, worms and trojans can be used to fetch data from these systems and hijack them.
Web Application Hacking
Explains how web applications are vulnerable, how to check security of various authentication and authorisation mechanisms, how to check for privilege escalation among other things. It also covers the most common mecha-nisms through which web applications are hacked.
Injection deals with how we can insert cleverly designed codes and queries to hack an application. It starts with SQL injection to hack databases followed by other forms of injection techniques like XML injection, LDAP injec-tion, SSI injection.
It deals with why mobile applications are hacked, how they are reverse engineered, how to monitor and modify tra?c between the client and the server. It also deals with major security issues found in mobile applications and elaborates on how to find and remove them.
Types of web servers, uses, what are the various vulnerabilities commonly found in webservers and how to remove them. It also includes advanced topics like Metasploit framework, commonly used by penetration testers for security assessment.
Firewall, IDS and IPS
Firewalls, IDS and IPS being the first targets of any data breach. This chapter deals primarily with Firewalls, IDS, IPS and Honeypots. For each entity, it briefly describes them, their working, how to evade them and some best practices about the same.
Covers various categories of malwares: viruses, worms, trojans, RATs, Ransomwares and Botnets. Trainees will also learn about how they work, how they infect the target system and how they are used to hijack any system or network.
Covers the basic introduction of DoS, types of DoS attacks, various tools used to perform DoS and their counter- measures. As an added feature, this chapter will also cover how underground DoS economy works.
This chapter covers how wireless networks are vulnerable and how they can be protected. It deals with creation of Fake access points, cracking basic authentication mechanisms of WPA, WEP and WPA 2.
Talks about techniques like phishing, types of phishing attacks, non-electronic methods of social engineering, call spoofing, OTP frauds, frauds involving e-wallets, banking and telecommunication frauds.
Cloud security covers basic cloud infrastructures, how they are deployed, how to secure them and various controls to implement strong security over cloud applica- tions. It talks about various security models and their advantages.
Internet of things (IoT) security
IoT security deals with introduction to IoT devices, security of hardware, software and communicating channels. It covers basic attack surfaces, vulnerabilities and mitigation strategies for IoT devices.
The trainees will learn how to systematically use their knowledge of security to perform security assessment of any application, server, cloud or IoT deployment and how to generate a formal report of the same.