CNSA(Certified Network & Security Associate)

CNSA Course is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Infosec responsibilities include establishing a set of business processes that will protect information assets regardless of how the information is formatted or whether it is in transit, is being processed or is at rest in storage.

Duration:  5 Months

Outcome: it provides you with a better understanding of important current security principles. It also demonstrates continuous improvement on your part.

That means it:

Audience: Those who are looking for the future in the field Information security, Cyber Security, Ethical Hacking.

Prerequisite:  Not specific but those who are pursuing Engineering, BCA, MCA, B.Sc. IT, M.Sc., B.Com Computer, and who are planning to build their career in the field of System, Security, and Network Administration.

Contents:

There are 3 modules that will be covered are:

  1. Red Hat Certified Engineer (including advance topic)
  2. Cisco Certified Network Associate(CCNA)
  3. LA Certified Information Security Expert

 CCNA Contents:

  1. Basic Networking
  2. Introduction to Wide Area Networks
  3. Internetwork Operating System (IOS)
  4. IP Routing (Static & Dynamic)
  5. LAN Switching
  6. IPv4 & IPv6
  7. STP,PVSTP,RSTP
  8. Virtual Private Network –VPN
  9. Redundancy Protocols
  10. Network Monitoring Tools
  11. NAT & PAT
  12. Cisco Express Forwarding
  13. Network Device Security
  14. WAN Technologies
  15. Troubleshooting

 

  1. LA Certified Information Security Expert Content:

Infrastructure Hacking:

  1. Digital Footprint & Information Gathering
  2. Network scanning
  3. Target Enumeration
  4. Cryptography & Steganography
  5. Password Cracking
  6. OS Login Bypass
  7. Malware Illustration
  8. Vulnerability Assessment Automation
  9. Introduction to Metasploit
  10. Hacking Database
  11. Exploiting Windows OS by Metasploit
  12. Exploiting Linux OS by Metasploit
  13. Reverse Engineering
  14. Network Sniffing
  15. ARP & DNS Poisoning
  16. Wireless Hacking [WEP+WPA1/WPA2]
  17. DOS & DDOS Attacks
  18. Social Engineering
  19. Introduction to Bash Scripting
  20. Report Generation

Web Application Hacking

  1. Understanding Architecture of Web Application and Database
  2. Understanding HTTP Protocol & Issue with SSL/TLS
  3. Understanding HTTP Methods
  4. Understanding Content Security Policy & HTP Headers
  5. Identifying the attack surface policy [Information Gathering – Nikto]
  6. Hacking Using Google
  7. OWASP TOP 10
  8. Introduction to Vulnerable Web Applications
  9. Vulnerability Scanning Using Owasp Zap
  10. SQL Injection
  11. Cross-Site Scripting
  12. Cross-Site Request Forgery
  13. XXE Attacks
  14. OS Code Injection
  15. Local/Remote File Inclusion
  16. Cryptographic Weakness
  17. Insecure File Uploads
  18. Introduction to WAF
  19. Evading WAF
  20. Report Generation