Curriculum
I. Information Security Overview
a. Essential Terminology
b. Elements of information Security
c. Security, Functionality and Usability
II. Information Security Threats and Attack Vectors
a. Network Threats
b. Host Threats
c. Application Threats
III. Hacking and Ethical Concepts
a. What is Hacking and Hacker Classes?
b. What is Ethical Hacking?
c. Why Ethical Hacking is necessary?
IV. Hacking Phases
a. Foot printing and Reconnaissance
b. Scanning
c. Vulnerability Assessment
d. Gaining Access
e. Maintaining Access and Clearing Tracks
V. Information Security Controls
a. Information Assurance
b. Threat Modelling
c. Enterprise Information Security Architecture
d. Information Security Policies
e. Types of Security Policies
f. Steps to Create and Implement Security Policies
g. Incident Management Process
h. Physical Security
VI. Penetration Testing
a. What is Penetration Testing?
b. Why Penetration Testing?
c. Blue Teaming and Red Teaming
d. Types of Penetration Testing
VII. Demo on Phases of Hacking
VIII. Information Security Laws and Standards