Cyber Security Academy

Masterclass: Building a Better Barrier - Anticipate, Secure & Protect

Course Description

This two day cyber security masterclass offers a complete rundown of various means for specialized IT individuals to shield themselves against the growing number of cybercrime on the internet. Individuals will be mentored on how to identify and anticipate different types of virtual threats and how to best protect their data against these said malicious threats. This masterclass also guides individuals through simulations on detecting open ports, online malware testing, as well as email, passwords, and website security amongst other things.

Learning Outcomes

Upon successful completion of this masterclass, participants will be able to:

  • Understand how hackers gather sensitive data on their target before hacking
  • Learn how global IP addresses are allocated
  • Understand how to secure an organization/business online
  • Practice how to stay anonymous
  • Identify spoof emails
  • Understand how to use 3rd party hacking softwares
  • Create and identify small malwares
  • Understand how passwords are broken and how to take countermeasures
  • Understand the basics of web security

Content Highlights

  1. Foot-Printing
    • Types of Foot Printing
    • Methods & Techniques
    • Finding IP, OS of website
  2. Port Scanning
    • Tools
    • Types of Port
    • Virtual port numbers
    • Detecting Open ports
    • Anti-Port scanning Methods
    • Countermeasures
    • Finding open port for any domain name
    • Preparing entire Foot Printing report
  3. Malware
    • Trojan
    • Keyloggers
    • Virus & Worms Concepts
    • Bat File Scripting
    • Countermeasures
    • Blocking harmful batch files script
    • Testing Malware online
  4. Identify Attacks
    • Web Proxy
    • Proxy Bouncing
    • Performing Proxy Bouncing
    • Introduction of TOR browser
    • Dark web
  5. Email Security
    • Various Protocol of Email
    • Email Spoofing
    • Sending spoof email
    • Review Email Header
    • Use mail Tracker
    • Domain and IP Blacklisting
    • Countermeasures
  6. Password Cracking and Prevention
    • Complexity of password
    • Password cracking Techniques
    • Cracking web based Passwords
    • Kali linux Tools introduction
    • Installing kali Linux, creating password email account, cracking it
    • Countermeasures
  7. Other types of Attack
    • DoS & DDoS Attack concepts
    • Social Engineering attack
    • Steganography and Steganalysis
    • Hiding data behind image using stenography technique
  8. Website Security
    • Google Dorks
    • Using google Dork to find sensitive information
    • Defending against basic SQLi website hacking
    • SQL Injections Basics


19-20 June 2019


9 AM - 3 PM

Register Now

To register for the course, please fill in the details below and a BIBF representative will attend to you within the next 24 hours.

Organization SponsoredSelf Sponsored

Download Brochure


BIBF's Digital Transformation Academy