CCSA 

Certified Cyber security associate

CCSA is particularly crafted for newcomers who wish to build a career in Cyber Security domain.

This course incorporates all the significant subdomains (Web/ Mobile/ Network & Forensics) of Cyber Security which assists an individual to take further selection on the best field of interest. 

Scroll down to check the detailed syllabus.

1

Fundamentals of cybersecurity & Ethical hacking

Introduction to cyber security | Elements of cybersecurity | What is hacking? | Difference between hacking & ethical hacking | Types of hackers | Phases of Ethical Hacking

2

Basics of computer network

What is network? | What is internet? | Introduction to IP address | Introduction to Networking protocols | Brief introduction of how networking works | Introduction of network components

3

System hacking & safeguarding

Virus, worms & other malwares | How key loggers work? | System hacking using malware | How to create virus? | How to check if your system has the virus? | System safeguards

4

Social engineering & security

What is phishing? | Vishing | Email security | Counter measures of phishing

5

WEb application basics

Introduction to web application | Introduction to database | Introduction to server | How web-hosting works?

6

web application Hacking & Security

Introduction to web application | Introduction to database | Google hacking techniques | Introduction to OWASP top 10 project | SQL injection and mitigation | XSS and mitigation | Burp suite guide | Mitigation techniques

7

Network Basics

Information gathering techniques | Network sniffing | Network scanning | Port scanning | Introduction to DNS | How to safeguard network?

8

Introduction to kali linux

What is kali Linux? | Introduction to VM ware | Working with KALI Linux | Basic Kali Linux commands | Introduction to hacking platform - Metasploit

9

Reverse engineering 

What is reverse engineering? | Introduction to assembly languages | Reverse Engineering tools

10

wireless security

How Wi-Fi works? | Different protocols of WIFI | MAC filtering | Types of authentication | Types of wireless attacks | Security counter measures

11

mobile security basics

What is android? | Android architecture | Android phone rooting | Security checks on Android

12

cryptographic basics

What is cryptography? | Introduction to various techniques of cryptography | Types of encryptions and hashes

13

cyber forensics fundamentals

Email tracing | System log analysis | Server log analysis | Data recovery | Security countermeasures

14

Introduction to dos,ddos & botnet

What is DoS attack? | How to protect against DoS attack? | What is DDoS attack? | How to protect against DDoS attack? | Introduction of Botnet

15

cyber laws & IT acts

Various Cyber laws across globe | Indian IT acts | What is GDPR?

16

Case studies of major famous Hack & Data breaches | Cyber Security stats

case studies

Want to learn from Hacker himself?

Fill out the form(right side) to get one to one live training. -->

Social

Contact

hi@thecomputerjoker.com

© copyrighted 2021. All Rights Reserved.