- AIC, Privacy,
- 7is, Security Controls,
- Non repudiation,
- Vulnerability, Threat
- Risk Management
- Risk Analysis,
- Data Classification,
- Asset Identification,
- Risk identification,
- Risk Mitigation
- Computer architecture
- Stack
- Buffe overflow
- Virtual-Machine Based Rootkits (VMBRs)
- Virtual Machine Concepts
- Computer system organization and operations
- System software
- Role of OS
- Storage in Computer
- Process Management
- Memory Management
- File Management
- Shell
Linux System Architecture
o Basic Commands
o Basic networking administration
o Shell Scripting
- OSI Layers
- TCP/IP Models
- Routing
o Types of Routers
o IP Router Operations
o Data Path Operations
o Control Plane Operations
o Routing table exchange algo
- Switching
- Software defined Network (SDN)
- Kali Linux Installation
- Python Built-in types
- Python operators
- Python Control flow
- Python functions
- Python classes
- Python modules and packages
- Network Socket Programming
Python Projects
o TCP Client-Server
o Building a TCP Proxy
o SSH Tunneling
o Writing Sniffer, UDP Host Discovery Tool
o Programming with Scapy
- AWS Setup
- AWS network overview
- Virtual Private Cloud
- Direct Connect and VPN
- Azure Setup
- Azure Administration and APIs
- Azure Virtual Networks
- Azure VPNs
- Azure ExpressRoute
- Azure Network Load balancers
- NIDS/HIDS
- Snort
- IPTables
Firewall configuration
- Password cracking
- Nmap
- Nessus
- Tcpdump
- Wireshark
- Metasploit
- Burp Suit
- SQL Injection, Bufferoverflow
- Using Web Libraries
- Windows Privilege Escalation
