• AIC, Privacy,
  •  7is, Security Controls,
  • Non repudiation,
  • Vulnerability, Threat
  • Risk Management
  • Risk Analysis,
  • Data Classification,
  • Asset Identification,
  • Risk identification,
  • Risk Mitigation
  • Computer architecture
  • Stack
  • Buffe overflow
  • Virtual-Machine Based Rootkits (VMBRs)
  • Virtual Machine Concepts
  • Computer system organization and operations
  • System software
  • Role of OS
  • Storage in Computer
  • Process Management
  • Memory Management
  • File Management           
  • Shell

Linux System Architecture

o   Basic Commands

o   Basic networking administration

o   Shell Scripting

  • OSI Layers
  • TCP/IP Models
  • Routing

o   Types of Routers

o   IP Router Operations

o   Data Path Operations

o   Control Plane Operations

o   Routing table exchange algo

  • Switching
  • Software defined Network (SDN)
  • Kali Linux Installation
  • Python Built-in types
  • Python operators
  • Python Control flow
  • Python functions
  • Python classes
  • Python modules and packages
  • Network Socket Programming

Python Projects

o   TCP Client-Server

o   Building a TCP Proxy

o   SSH Tunneling

o   Writing Sniffer, UDP Host Discovery Tool

o   Programming with Scapy

  • AWS Setup
  • AWS network overview
  • Virtual Private Cloud
  • Direct Connect and VPN
  • Azure Setup
  • Azure Administration and APIs
  • Azure Virtual Networks
  • Azure VPNs
  • Azure ExpressRoute
  • Azure Network Load balancers
  • NIDS/HIDS
  • Snort
  • IPTables

Firewall configuration

  • Password cracking
  • Nmap
  • Nessus
  • Tcpdump
  • Wireshark
  • Metasploit
  • Burp Suit
  • SQL Injection, Bufferoverflow
  • Using Web Libraries
  • Windows Privilege Escalation