Our TRAINING Program
Relearn Academy introduces participants to major concepts in computer networks with linux administration, next generation firewall, active directories and network/web pentesting in an integrated and hands-on fashion.
As students progress to increasingly advanced topics, they gain considerable flexibility in shaping their career.
Six months certification program on Cyber Security: Novice to Expert is divided into two terms of three months each.
Term one consists of foundation subjects which builds depth and breadth in areas ranging from Computer Networks with Linux Administration, Next Generation Firewall, and Windows Active Directories which are needed for students to excel in the area of cyber security.
During the term two of the program students gain understanding, competence, and maturity by advancing step by step through topics of greater and greater complexity such as network (wired and wireless) pen testing, web-security & buffer overflow exploitation.
PRE-REQUISITE KNOWLEDGE/SKILLS FOR TERM-1
Basic understanding of computer network & TCP/IP is recommended however it is not mandatory.
COURSE OBJECTIVE FOR TERM-1
Upon successful completion of the first term, students should be able to:
- Understand, design & implement various network topologies.
- Configure routers with various routing protocols.
- Configure network switches with various switching technologies
- Configure & troubleshoot various linux based servers.
- Configure & implement Next Generation Firewall
- Configure & implement Window Active Directories
- The contents of this course are designed to support the course objectives. The following focus areas are included in this course:
Basics of Linux OS, Permission & User Management, File Systems & Software Management using RPM & YUM, Linux Installation, Processes and Task Schedulers, Implementing FTP Server, Configuring Apache Web Server, Configuring NFS/NIS, Configuring Samba Server, Configuring Dynamic Host Configuration Protocol Server, Configuring Domain Name Server, Apache, NFS/NIS, Samba, DHCP, DNS, etc., Virtualization using KVM, SAN & NAS Implementation, SeLinux
Routing & Switching
IP Addressing, IPv4 Header, IPv4: Classes, Fixed Length Subnet Mask, Variable Length Subnet Mask, Static Routing, Default Routing, Difference between Distance Vector & Link State Routing Protocols, Routing Information Protocol, Enhanced Interior Gateway Routing Protocol, Open Shortest Path First, Access Control List: Standard, Extended & Named, Network Address Translation, Port Address Translation, Challenges of IPv4, IPv6 Header, IPv6 Address Types, IPv6 Address Format, IPv6 Static Routing, IPv6 Default Routing, Routing Information Protocol Next Generation, IPv6 over IPv4 Tunnels, VLAN Trunking Protocol, VTP Pruning, Spanning Tree Protocol, Ether Channels, Switch Security
Next Generation Firewall
Introduction to Firewall, Setting up Firewall, Securing your network using Firewall, Management of Firewall, Configuration of Firewall, Network Monitoring Tools, Traffic Shaper, Configuring Firewall Rules, Remote Firewall Rules, VLAN Configuration in Firewall, WAN Failover & Load Balancing, NAT & Port Forwarding, Open VPN, Backup & Restore
Overview, Active Directories Components, Administration, Forest, Domains, Schema, Trusts, Sites, Subnets & Replication, Organisational Units, DNS, Domain Controllers, DCLocator, Global Catalog, FSMO, Read Only Domain Controllers, DNS Zone Hosting,Kerberos Handing, Authentication & Password Caching, Directory Services Restore Mode (DSRM) Account, Active Directory Database, Group Policy, Authentication, The evolution of Windows Authentication, NTLM, Kerberos, Active Directory Administration Group, AD Security Enhancement, Active Directory Security Best Practices
PRE-REQUISITE KNOWLEDGE/SKILLS FOR TERM-2
- Solid understanding of computer network & TCP/IP.
- Working knowledge of python scripting.
- Sound understanding of Linux.
COURSE OBJECTIVE FOR TERM-2
Upon successful completion of the second term, students should be able to:
- Audit Computer Networks (Wired & Wireless)
- Pentest Web Applications
- Identify Buffer Overflow Attacks
- Apply Powershell & Pentest Active Directories Environment
- Implement Server Hardening Techniques
Auditing Network Security
Introduction to Network Security, Netcat, Ncat, Wireshark, TCP Dump, Auditing Routers: Setting up Lab, Attacking SSH with Metasploit, Hydra & Medusa, Attacking SNMP with NMap, Hydra & Medusa, Attacking Web-Admin Interface, SNMP Post Exploitation, SNMP audit with SNMPCheck & OneSixtyOne, SNMP Audit using Braa & NMAP NSE Scripts, Google Hacking, Passive Information Gathering, Active Information Gathering, DNS Enumeration, Port Scanning, TCP Connect Scanning, TCP SYN Scanning, Network Sweeping, OS Fingerprinting, Banner Grabbing/Service Enumeration, Nmap Scripting Engine (NSE), SMB Enumeration, Scanning for the NetBIOS Service, Null Session Enumeration, Nmap SMB NSE Scripts, SMTP Enumeration, Social Engineering, Bind Shell, Reverse Shell, Mastering Metasploit, Auditing Window Based Systems, HTTP/HTTPS Tunneling Payload, Automatic Outbound port detection, Port Forwarding, Pivoting, AV Evasion, Encoding Payloads with Metasploit, Encrypting known malwares with software protectors, Win 7 Privilege Escalation & UAC Bypass, Win7 Hash dumping & Mimikatz, AV Evasion with VEIL Framework, DNS File Exploitation, Understanding Windows Prefetch Directory, Disabling Windows Prefetch, Remote Memory Dumping & Analysis, Dumping Passwords from Browser Memory, Full Memory Analysis with HxD, Dumping process memory with volatility, Password Attacks
Auditing WLAN Security
Understanding various bands & channels, Pwning Beacon Frames, Pwning Hidden SSIDs, Hotspot based Attacks, Understanding WEP, Attacking WEP Authentication, Understanding WPA/WPA2, WPA-PSK, WPA-PSK Cracking, Setting up FreeRadius-WPE, Basics of EAP-MD5, EAP Types & PEAP, Cracking PEAP, Cracking EAP-TTLS
Auditing Web Application Security
Introduction to Open Web Application Security Project (OWASP)
A1-Injection, A2-Broken Authentication and Session Management, A3-Cross-Site Scripting (XSS), A4-Insecure Direct Object References, A5-Security Misconfiguration, A6-Sensitive Data Exposure, A7-Missing Function Level Access Control, A8-Cross-Site Request Forgery, A9-Using Components with Known Vulnerabilities, A10-Unvalidated Redirects and Forwards, SQL Injection, Authentication Bypass, Enumerating Databases, Leveraging SQL Injection for code, Types of XSS, Persistent, Reflected & Dome-Based, Browser Redirection & IFRAME Injection, Stealing cookies & Session Information, Command Injection, Web to Shell on a server, Web Shell using Python, File upload vulnerability, Local File Inclusion, Remote File Inclusion, Insecure Direct Object Reference
Server Hardening, Firewalls/IPTables, Disabling direct root login, Disabling unwanted SUID & GUID, Hiding DNS Binding & Apache Version, Hardening sysctl.conf, Logwatch, Mod Security, Securing /tmp /var/tmp /dev/shm
Buffer Overflow Exploitation
Fuzzing, Vulnerability History, A Word About DEP and ASLR, Interacting with the POP3 Protocol, Replicating the Crash, Controlling EIP, Binary Tree Analysis, Sending a Unique String, Locating Space for Your Shellcode, Checking for Bad Characters, Redirecting the Execution Flow, Finding a Return Address, Generating Shellcode with Metasploit, Getting a Shell, Improving the Exploit
Attacking Windows Active Directories
Domain Enumeration, Local Privilege Escalation, Domain Enumeration Bloodhound, Lateral Movement, Domain Persistence, Domain Privilege Escalation, Kerberoast, Cross Forest Attacks
The Fees of this course is Rs. 32,000 /-
The Registration Fees is Rs. 2,000/-