CICSA-Brochure
CICSA-Brochure
Labs:
Social Engineering
Phishing
Zphisher
Labs:
Router Configuration
OSPF and EIGRP
Switch Configuration
Vlan and VTP
Access Control List configuration
Section B
Microsoft Server
Introduction to Server
Types of Physical Server
Installation of Client and Server and Best practices
Common Server Roles and Configuration
Kerberos-Golden Ticket and attacks
RAID levels
Labs:
OSPF Routing
EIGRP Routing
ACL configuration
Switch configuration
VLAN configuration
VLAN Trunking Protocol
MODULE 3
1 weeks (10 hours)
LINUX ESSENTIALS
Kali-Installation-Configuration (Manual Partition )
Introduction to Linux
Linux vs Windows
Linux fundamentals
Basic Commands
User Management -Permission-Process
File System-Boot Process
Linux booting process
Kernel
Basic Commands
Bash Scripting
Installing Software
Pipes and Filters
OFFENSIVE SECURITY
Scanning
Attacks on Cyber Security
Hacking Phases
OSINT tools
VPN & TOR
Cryptography
Information Gathering Techniques
Scanning -Tools -Nmap
Metasploit Framework
Brute Force Attacks
Enumeration Exploitation
Vulnerable machines from Pentest Garage
Privilege Escalation-Boot to Root
Labs:
Labs:
BurpSuite
Owasp Top 10 vulnerabilities (2017 & 2021)
Labs:
Firewall configuration
Iptables
IPS and IDS
Wireshark
Snort
Labs:
Labs:
Solarwinds Papertrails
Wazuh
Labs:
Splunk Enterprise
Splunk Universal Forwarder
Searching with Splunk
Integration
Alerting and Reporting
Regular Expression
Use Case Creation
INCIDENT RESPONSE
Incident Response Team IRT
Cyber Threat Intelligence CTI
Indicators of Compromise
Labs:
TM
Target Audience
Cybersecurity professionals
Penetration testers
Network administrators
Applications security personnel
Information security architects
Governance staff
Certification
RedTeam Hacker Academy’s
CERTIFIED IT INFRASTRUCTURE & CYBER SOC ANALYST
Examination Codes
ICT Networks and Infrastructure 800 - 001 Linux for Pentesters 800 - 002
Safeguarding enterprise security with foolproof security strategies, tools, and best practices
Enhancing organizational security with cyber Kill Chain and Offensive Security practices
Blue teaming to identify, evaluate existing security architecture and develop remedial plans
Setting up cyber Security Operation Center (SOC) to observe organizational cyber defence
Due to skyrocketing data breaches at the global level, having defensive security or
cybersecurity defending proficiency promises enormous career opportunities among overall
security functions. A professionally skilled cybersecurity defence specialist helps the
organization in protecting valuable data and information contributing to bolstering business
performance and productivity.
Cybersecurity Analyst
Penetration Tester
Security Engineer
Cybersecurity Specialist
Security Consultant
A survey conducted by the Centre for Strategic and International Studies reflects that
82% of employers admit a skill gap of efficient cybersecurity workforce and 71% of the
survey taker s agree that this skill shortage affects substantial damage to
their businesses directly.
Ethical Hacker
Security Engineer
Security Architect
Penetration Tester
Incident Responder
Security Auditor
Leaders in
Cybersecurity Trainings
Mission
To be one and only choice for end-to-end cybersecurity training
among security aspirants and organizations and contribute towards
minimizing cyber theats and crimes.
Singapore Brazil
Indonesia Sri Lanka
UAE Canada
Saudi Arabia UK
India US
RedTeam Hacker Academy is the best institution for learning cybersecurity and networking.
Faculties are very friendly and helpful and the way of teaching is very good....study materials
are very useful. It is very good institute for building a good career route in cybersecurity. We
can study and practice to defend against cyberattacks and security breaches.
I will recommend RedTeam to those who are planning to build their career in cybersecurity and
improve their knowledge.
SANEERSHA HAKKIM
I would like to refer to the people who are looking for cyber security & ethical hacking
institutes in kerala.... RedTeam hacker academy is one of the best institutes to learn ethical
hacking..!
Experience in RedTeam Hacker academy has been very good throughout my classes .Each &
every class was interactive & informative. Management, Staff, and facilities are friendly and
helpful. I will always recommend people to enroll courses here for a good future
MOHAMMED ARSHAD
Though I was a little hesitant to join RedTeam Hacker Academy initially, the whole team
and their approach towards the subject and students stroke right through. From
clearing every little doubt to giving in enough inputs to let us learn and grow, it was
evident that they were invested in bringing out the best in us. Anyone be it a beginner
or of any level of experience can firmly move forward in choosing the institution to
excel in the respective field.
SALWA SAID MOHAMMED
Excellent experience from the institute. All tutors are having promising approaches
towards the students. The passion of each student will be boosted higher and higher. As
a former student I would suggest that this is a perfect place for passionate techies who
are interested in the security field. They would never feel guilty.
EDWIN SHIBU
PANEL DISCUSSION
2018
2019
2020
PANEL DISCUSSION
Contact
@redteamacademy