Introduction to Vulnerability Analysis

Course Description

Network Penetration Testing course for beginners taking you from wondering what hackers do to setting up a lab, learning Kali Linux, and conducting your own network penetration testing!.

Would you like to learn what hackers do to setting up a lab, learn Kali Linux and conduct your own penetration testing because this will help you level up your cyber security and ethical hacking career?

What you'll learn

Linux Security

The Linux Operating System has proven time and time that it reigns supreme in configurability and security. 
Being well versed in Linux Security can make the difference between a highly available web server and a 
compromised warez distribution point. Understanding Linux Security can make or break your ability to survive 
in the world of ever-changing Computer Security. The Authors Brad Causey and Bobby Rogers work together to 
present Linux Security so you can carry the knowledge back and use it in a practical manner. To begin learning 
simply click the links.
Introduction & Course Outline
-- Introduction
Introduction To Linux Security
-- A Bit About Linux Pt.1
-- A Bit About Linux Pt.2
-- Current Security Problems
-- Requirements of a Secure OS
-- Security: Windows vs Linux
-- Overview of Linux Security Features
Secure Linux Installation
-- Selecting the Right Distribution
-- Defining Partitions for Security
-- Installing Software & Services
-- Installing Secure File Systems
-- Installation Security Configurations
-- Post Install Actions
-- Secure Installation Demonstration Pt.1
-- Secure Installation Demonstration Pt.2
-- Secure Installation Demonstration Pt.3
Securing The Linux Boot Process
-- Securing LILO
-- Securing GRUB
-- Runlevel Security & initab
-- Partition Mounting & fstab
Security With Users & Groups
-- Users & Groups
-- Passwords Pt.1
-- Passwords Pt.2
-- Use of Privileged Accounts
-- Securing User Shells & Profiles
File System Permissions
-- Types of Files
-- Permission Structure
-- Special Permission Bits
-- Managing Permissions
Data Encryption
-- Introduction to Encryption
-- Using GNU GPG Pt.1
-- Using GNU GPG Pt.2
-- Using SSH
-- Hashing Utilities
-- Using PKI Certificates in Linux
Hardening Linux
-- System Hardening Overview
-- Bastille Pt.1
-- Bastille Pt.2
-- Securing X-Windows
-- Securing Linux Daemons
-- Security Patches
-- Security Benchmarks
Linux Firewalls
-- Introduction to Firewalls
-- IP Tables Pt.1
-- IP Tables Pt.2
-- IP Tables Demonstration Pt.1
-- IP Tables Demonstration Pt.2
-- Dedicated Linux Firewalls
Linux Security Mechanisms
-- TCP Wrappers
-- hosts.allow
-- hosts.deny
-- inetd & xinetd
-- PAMs
-- SELinux
-- Unsecure Linux Utilities
Secure Networking
-- OpenSSH
-- NIS
-- NFS
-- Securing FTP & HTTP Servers
Detecting & Stopping Linux Attacks
-- System Auditing
-- System Logging
-- File Integrity with Tripwire
-- Intrusion Detection with Snort
Linux Security Tools
-- Vulnerability Assessment with Nessus Pt.1
-- Vulnerability Assessment with Nessus Pt.2
-- Traffic Security with Ethereal
-- Web Proxying with Squid
Best Linux Security Practices
-- User Security
-- Password Security
-- Securing the Root Account
-- File System Security
-- System Security
-- Auditing Pt.1
-- Auditing Pt.2
-- Network Security


  • No prerequisites. Basics are covered

  • Anyone who wants to make career in Network Security domain

Technology Incubation Center CIU

  • 4.8 Institution Rating
  • 125,745 Students
  • 35 Courses

About Technology Incubation Center CIU

Technology Incubation Center CIU since inception in 2002, is committed to introducing new courses and certification programs pertinent to industry standard, which currently boasts a large pool of certified professionals benefitting more than 1,20,000 successful participants. TIC CIU's certified candidates that have become the most sought after professionals serving reputed corporates and government organisations like CISCO, Microsoft, TCS, Infosys, Dell, IBM, GM, Wipro, HCL, HP ... and the list grows crossing more than 1000 companies which have trusted our trained and certified professionals to become their valued assets.

    Dual Degree - PGD Cybersecurity & Ethical Hacking + MSc IT

  • This is a dual degree program in which you can choose to complete MSc IT (Any 16 papers + project) simulateneously along with this PG Diploma program ( Awarded by ICTP) while MSc IT is awarded by our partner institution, UGC Recognised University. MSc IT is assessed based on UGC's CBCS System where it can be completed in fastrack mode.

    -- Topics in MSc IT ( Any 16) --
     Advance Java Programming
     Interactive Computer Graphics
     Software Engineering & Management
     Algorithm Design and Analysis
     Operating Systems
     Electronic Commerce and Tools
     Artificial Intelligence
     Trends in Computing
     Software Testing and Quality Assurance
     Visual C++ Programming
     Linux Administration
     Systems Approach to Management
     Information Systems
     Object Oriented Programming
     Computer Organization
     Software Lab OOPS
     Data Communication s and Networks
     Relational Database Management Systems
     Data Structures
     Web Technologies
     Software Lab Web Tech
     Financial Management and Accounting
     Information Security
     Data Warehousing and Mining
     Network Security
     Project