CIA Triad, Authentication & non-repudiation, Vulnerability, Threat, Risk, Assessment & Tools, Kali Linux & Tools, Nexpose, Qualys, Open VAS, Network Reconnaissance & Scanning, Port Scanning techniques (NMAP, ZENMAP), Enumeration, MIM, SQL Injection and Social Engineering Attacks, Metasploit, BURP SUITE and OWASP, Concepts of Cryptography, BCP (Business Continuity Planning) and Disaster Recovery, Security Auditing & Compliance'. Introduction to Cyber Security, Networking Concepts Overview , Security Management, Network Security, System and Application Security, and OS Security.
