Home

/

Courses

/45 Days Cyber Security Summer Internship Program

45 Days Cyber Security Summer Internship Program

The skillbox

13 modules

English

Embark on an immersive 45 DAYS journey into the heart of cybersecurity with The Skill Box. Led by industry experts, our Cyber Security on Enterprise Level course . Delve into ethical hacking, incident response, Cyber Crime and Digital Forensics through hands-on, role-based training.

Modules

Module 1: Introduction to Ethical Hacking & Fundamentals & Cryptography

13 attachments • 10 hrs

CEH Fundamentals by Sagar Ajaj Rahalkar, A-Z of Cyber Security , Basics of Cryptogaphy

First Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jun_14_2024-05_03-PM

TSB CSIP M1 P1 Notes

11 pages

Second Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jun_18_2024-05_08-PM

TSB-CSIP - M1 (Part 2)

15 pages

Third Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jun_21_2024-05_05-PM

Certified_Ethical_Hacker_CEH_Foundation (1)

207 pages

Fourth Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jun_24_2024-05_36-PM

Fifth Lecture - Cyber Security Compliance and Regulation Acts_Jun_28_2024-04_00-PM

Seventh Lecture _Jul_03_2024-05_14-PM

Eighth and Ninth Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_05_2024-11_06-AM

_Ninth Lecture and Tenth _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_06_2024-05_10-PM

Cyber Security Jargon (A-Z)

70 pages

M1.1 Embrace the Ethical Hacker Mindset

M.1.2 Master the Hacker Mind

M.1.3 Conquer the Attack Phases / Pentesting

11 attachments • 5 hrs

M.1.3.1 Reconnaissance

15th Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_19_2024-04_57-PM

TSB-CSIP- Footprinting

18 pages

13th and 14th Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_15_2024-05_34-PM

M.1.3.2 Scanning

16th Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_24_2024-05_05-PM

M.1.3.3 Enumeration

M.1.3.4 Vulnerability Analysis

M.1.3.5 Gaining Access

M.1.3.6 Exploitation

M.1.3.7 Post-Exploitation

Module 2: Advanced Penetration Testing Techniques

3 attachments

M.2.1 Malwares and Malware Analysis

M.2.1.1 Malware Creation Fundamentals

M.2.1.2 Malware Analysis : Static and Dynamic

M.2.2 Web Application Security

8 attachments

M.2.2.1 OWASP Top 10

M.2.2.2 Web Application Penetration Testing

M.2.3 Network Security Essentials

M.2.3.1 Network Traffic Analysis

M.2.3.2 Network Spoofing Techniques

M.2.3.3 Denial-of-Service (DoS) Attacks

M.2.3.4 Common Social Engineering Attacks

M.2.3.5 Evading IDS, IPS, Firewalls and Honeypots

Module 3 : Understanding Cyber Threats & Incident Response

3 attachments

M.3.1 Threat Landscape & Indicators of Compromise (IOCs)

M.3.1.1 Evolving Cyber Threats

M.3.1.2 Indicators of Compromise (IOCs) and Threat Intel

M.3.2 Security Event & Log Management

2 attachments

M.3.2.1 Security Event Logs

M.3.2.2 Log Management for Threat Detection

Module 4: Unveiling Cybercrime & Digital Forensics

4 attachments

4.1 Cybercrime: The Cost & Impact:

M.4.1.1 The Cybercrime Landscape

M.4.1.2 The Devastating Effects of Cybercrime

M.4.1.3 The Financial Cost of Cybercrime

4.2 Digital Forensics: The Art of Preserving Evidence

2 attachments

M.4.2.1 Introduction to Digital Forensics

M.4.2.2 Importance of Digital Evidence

M.4.3 The Digital Forensics Process

2 attachments

M.4.3.1 Forensic Acquisition Techniques

4.3.2 Maintaining the Chain of Custody

4.4 Presenting a Compelling Case

1 attachment

M.4.4.1 Forensic Reporting

Case Studies

1 attachment • 1 hrs

12th Lecture _ 45 Day Cyber Security Training + Internship By The SkillBox_Jul_13_2024-04_56-PM

FAQs

Can I access the course materials on any device?

Yes, our platform is designed to be accessible on various devices, including computers, laptops, tablets, and smartphones. You can access the course materials anytime, anywhere, as long as you have an internet connection.

How can I access the course materials?

Once you enrol in a course, you will gain access to a dedicated online learning platform. All course materials, including video lessons, lecture notes, and supplementary resources, can be accessed conveniently through the platform at any time.

Can I interact with the instructor during the course?

Absolutely! we are committed to providing an engaging and interactive learning experience. You will have opportunities to interact with them through our community. Take full advantage to enhance your understanding and gain insights directly from the expert.

About the creator

About the creator

The skillbox

At Skill Box, we specialize in role-based cybersecurity training. Your role in cybersecurity is unique, and we tailor our programs to help you excel in it.

Join us to master the skills crucial for ethical hacking, incident response, malware analysis, and more.

Immerse yourself in a world where theory meets practice, where each byte of knowledge is infused with practicality, and where your journey transcends learning—it transforms into mastery.

Rate this Course

×

Order ID:

This course is in your library

What are you waiting for? It’s time to start learning!

Illustration | Payment success

Share this course

https://undefined/courses/45-Days-Cyber-Security-Summer-Internship-Program-668ba93fbd36763b8fe16e3f-668ba93fbd36763b8fe16e3f

or

×

Wait up!

We see you’re already enrolled in this course till . Do you still wish to enroll again?

Illustration | Already enrolled in course