Register Now Pay Now
Professional Cyber Security - Career Focused Advanced Training - B5
Cyber Security is a vital part of day to day Information Technology domain. If you are a programmer, system analyst, system administrator, student or a general computer user, it is better to understand IT Security/ Cyber Security to keep yourself safe and protected from cyber threats and cybercriminals. This course is designed to mentor you with practical labs, industry knowledge & real-life experience. After successful completion of this course, you will have a solid baseline knowledge and confidence to become an IT Security Analyst / Cyber Security Analyst.

Who Can Join This Course?

Basic programming knowledge, PC/Laptop with minimum 8 GB RAM, Ensure 10+ hrs./week practice time. NO EXCUSE attitude.

Course Outline

Course Intro.

● Overall objectives.
● Learning strategies.
● Assignments and tracking.

Introduction to IT & Cyber Security Overview.

● Overview of IT Security.
● Branches & Domains of IT Security.
● Cyber Sec Opportunities / Home & Abroad.
● Job Opportunities in Cyber Security.

Linux fundamentals required for IT Security.

● Linux commands summary.
● Files & directory structures.
● Users and privileges.
● Services.
● Snapd.
● Git use.

Networking fundamentals required for IT Security.

● Networking Devices.
● OSI Layer.
● DNS, Reverse DNS, TCP/IP.
● Subnetting concept.
● Firewall, ACL etc.

Python required for IT Security.

● Strings.
● Conditional Statements.
● Operators & Maths.
● Functions.
● Loops.
● List.
● File Operation.
● API Integration concept.
● Interesting 10+ small security-focused project ideas and how to accomplish them.

Cybersecurity Tools & Applications.

● Recon Tools.
● NMAP more.
● Metasploit.
● Process Hacker.
● X64dbg.
● Linux command automation using parallel.
● Others.

Security Lab Setup.

● VirtualBox.
● Kali.
● XP.
● Metasploit Box.
● Win-Server.
● Win-10.

Reconnaissance Overview.

● Theory.
● Tools & Techniques.
● Lab Simulation.

Scanning and Enumeration.

● Tools & Techniques.
● Enumerating HTTP.
● Enumerating SMB.
● Lab simulation.

ProxyChain.

● How to be anonymous.
● Proxy chain configuration and use.

MSF Venom.

● Manual payload creation and deployment to Windows System.
● Windows 7, 10 exploit.

Post Exploitation and Privilege Escalation.

● What is a post-exploitation.
● Persistence.
● Lab exercise.

Vulnerability Management.

● How Vulnerability Process work in real life.
● Tools & Techniques.
● Nessus installation and report generation.

Web Pretesting Basics.

● Few Top 10 OWASP Technique simulation.
● Web Pen Test Report Sample.
● Bug bounty basic and how to move forward.

Social Engineering Tools.

● WebCam and Location Access.
● Phishing email simulation.
● SET tool use.

Malware Analysis.

● Malware Types.
● What is Static & Dynamic Analysis.
● How to prepare a lab for Malware Analysis.
● Sample Analysis using Static and Dynamic Method.
● Malware Analysis using OSINT tools.
● Different Malware’s behavioural analysis.

Use of OSINT (Open Source Intelligence).

● Tools & Techniques.
● Practical Scenarios.

Incident Response & Analysis - SOC Stages.

● Detail discussion of phases.
● Tools & Techniques.
● Discussion about various real-life scenarios.

Security Information and Event Management (SIEM).

● Introduction to various SIEM solutions.
● Introduction to Splunk (with free Certification).
● Wazuh.

Active Directory Attack Scenario.

● Introduction Lab setup.
● Complete Simulation & practice of AD Attacks.
● Tools related to AD PenTesting.

Phishing Email Analysis.

● Introduction to IDS / IPS System & Lab Setup.
● How to install Snort and create rules to detect threat.

WiFi Hacking.

● Concept.
● Tools and techniques to use.

Security Projects using Python.

● Sample project ideas and implementation.
● How to create custom tools using python.

Windows Forensic.

● Why and when do we need this?
● Basic Registry Architecture.
● Tools for windows forensic and what to analyse?

Overview of CompTIA Security+ Exam.

● Introduction to CompTIA Security+ Exam.
● How to take preparation with a roadmap.
● Official CompTIA LAB Access and practice.

Cloud Fundamentals.

● Azure Fundamentals.
● How to achieve free Microsoft certifications.

Review & Tweaking.

● LinkedIn Profile Review & Tweaking.

Job Interview Preparation

● Mock interview with working Security professionals.

Batch 5

Schedule

Saturday and Friday 07:00 PM - 09:00 PM

Starts from Jun 03, 2023

Last date of registration is May 31, 2023 (1 Day Remaining)

Register Now Pay Now

Instructors

Mashihoor Rahman

Working as a Cyber Security Analyst (SOC Analyst/Incident Responder) in the Security Operation Center (SOC) at a multinational IT Company, Melbourne, Australia.

LinkedIn Profile

What Students Said

I have never seen such a careful trainer to build the career of students.

MD. IMRAN
MD. IMRAN

Professional Cyber Security - Career Focused Advanced Training Batch: 4

Alhamdulillah it was a wonderful journey with Dev Skill, specially mentor Mashihoor Rahman Sir such an amazing guide to grow enthusiasm within student and lead to consistent progress. Overall course curriculum is based on solid structure and up to mark. Anyone with basis knowledge can cope up with this balanced syllabus. Few basic classes helped to understand the advanced topics as well as more advanced topics were also conducted in extra classes. Within wide range of domains and huge resources course-based guideline can lead anyone to precise target. Hope Dev Skill will be more visible in upcoming days. This course helped me to be more confident and consistent. My cordial respect and prayer to my mentor Mashihoor Rahman Sir.

MD AMINUL KABIR
MD AMINUL KABIR

Professional Cyber Security - Career Focused Advanced Training Batch: 4

The course was packed with up-to-date material and real-life aspects that helped me better understand the different fields of Cyber Security. Moreover, we got a mentor with a genuine interest in helping us succeed. Rather than just presenting the theoretical concept he was also concerned about providing practical and relevant examples. This made the course feel more enjoyable, and applicable, and I left feeling much more interested in applying my learnings.

Anindita Acharjee
Anindita Acharjee

Professional Cyber Security - Career Focused Advanced Training Batch: 4

As I am from a non-IT background it was quite a challenge for me to continue in cyber security . I was searching for a course where I would be able to learn and enrich my skills. Fortunately, I have found this course and Alhamdulillah full topics were covered and I am much more confident right now . Our respective mentor has covered more topics than the syllabus . He gave us a friendly environment where we could share our problems.

Sadia Afrin
Sadia Afrin

Professional Cyber Security - Career Focused Advanced Training Batch: 4

By the grace of ALMIGHTY, I had variety level of experience that immensely helped me throughout my career journey. I had the chance to leverage proper mentorship, learned a lot and on top of that explored the psychological aspects of the cyberspace and its core operations, keeping a well balanced approach in the technical scaling as well. I am very grateful for the opportunities provided by Dev Skill and mostly introducing a "'SUPER' Awesome Mentor" to shape our learning curves accordingly. Truly, an amazing experience.

Binta Ansary Shantona
Binta Ansary Shantona

Professional Cyber Security - Career Focused Advanced Training Batch: 4

Professional Cyber Security - Career Focused Advanced Training - B5

Tk. 20,000
Registration 1 Day Remaining 39 people already registered
Schedule Saturday and Friday 07:00 PM - 09:00 PM Starts from Jun 03, 2023