Duration: 3 Months
Setting Up a Cybersecurity Lab (Week 1)
Virtualization: Installing VirtualBox/VMware.
Setting up Kali Linux for penetration testing.
Installing Metasploit, Wireshark, and other tools.
Network simulation software (e.g., Cisco Packet Tracer).
Introduction to Cybersecurity Concepts (Week 2)
Brief overview of cybersecurity fundamentals (CIA Triad, Attack Vectors).
Cyberattacks and real-world case studies.
Cyber ranges: Introduction to Capture the Flag (CTF) challenges.
Network Traffic Analysis with Wireshark:
Capturing and analyzing network traffic.
Detecting anomalies and suspicious traffic patterns.
Hands-on Task: Analyze a live network and detect abnormal traffic using Wireshark.
Firewall and IDS/IPS Configuration:
Configuring firewalls (e.g., pfSense).
Intrusion Detection Systems (Snort) and Intrusion Prevention Systems.
Hands-on Task: Set up a firewall and IDS/IPS, simulate an attack, and monitor traffic.
Encryption and Decryption in Practice:
Implementing AES, RSA encryption using Python.
Hands-on Task: Encrypt and decrypt sensitive files, emails, and messages.
TLS/SSL Certificates and Secure Web Traffic:
Configuring SSL/TLS for secure web communications.
Hands-on Task: Set up HTTPS on a web server, secure web traffic, and analyze encrypted traffic using Wireshark.
Reconnaissance and Scanning Techniques:
Using tools like Nmap, Netcat for network scanning and fingerprinting.
Vulnerability scanning using OpenVAS and Nessus.
Hands-on Task: Perform a full network scan, identify vulnerabilities, and report findings.
Exploitation and Post-Exploitation:
Using Metasploit to exploit vulnerabilities.
Post-exploitation techniques: Privilege escalation, persistence.
Hands-on Task: Exploit a vulnerable system using Metasploit, gain access, and escalate privileges.
OWASP Top 10 Vulnerabilities:
Overview of web application vulnerabilities (SQL Injection, Cross-Site Scripting, etc.).
Using tools like Burp Suite for web application testing.
Hands-on Task: Test a web application for common vulnerabilities (SQL Injection, XSS).
Web Application Exploitation:
Exploiting insecure code and misconfigurations.
Hands-on Task: Exploit a vulnerable web application (e.g., DVWA) and patch vulnerabilities.
Wireless Network Hacking:
Capturing Wi-Fi traffic and cracking WPA/WPA2.
Hands-on Task: Use Aircrack-ng to capture and crack a Wi-Fi password.
Password Cracking Techniques:
Dictionary attacks, brute-force attacks, and rainbow tables.
Hands-on Task: Perform password cracking using John the Ripper or Hashcat.
Incident Response Simulation:
Step-by-step approach to incident response: Identification, Containment, Eradication, Recovery.
Hands-on Task: Simulate a cyber incident (e.g., malware outbreak), investigate, and respond.
Digital Forensics:
Disk imaging, file recovery, and log analysis.
Hands-on Task: Perform forensic analysis on a compromised system using Autopsy or FTK Imager.
Offensive Challenge:
Students will simulate a penetration test on a vulnerable virtual network.
Tasks: Reconnaissance, scanning, exploitation, post-exploitation, and reporting.
Defensive Challenge:
Students will be tasked with defending a simulated network from a series of cyberattacks.
Tasks: Detect attacks, contain threats, and implement countermeasures.
Kali Linux, Wireshark, Metasploit, Nmap, Netcat, OpenVAS, Nessus, Burp Suite, Aircrack-ng, John the Ripper, Hashcat, Autopsy, Snort, pfSense.
Weekly Practical Assignments: Based on hands-on tasks and tool usage.
Midterm Offensive Challenge: Ethical hacking and penetration test.
Final Capstone Project: A combined offensive and defensive simulation project.