Basics of Information Security
Assurance
- Vulnerability Assessment
- Penetration Testing
- Patch Management/Asset Inventory
- Certifications & Standards for Security
Authentication
Malware & Malware Analysis
- Malware Classification
- Virus/Worm
- Botnet
- Poli/Metamorphic
- Ransomware
- Fileless
- Malware Analysis: Methods & Tool chain
- Threat Intelligence
- Yara
- Machine Learning & Malware Analysis
Web App Security – OWASP Top10
- SQL injection
- Session Management
- XML Injection
Code Security
- Buffer Overflow
- Integer Overflow
- Race Condition
- Format String
- SPECTRE
Network Security
- Intrusion & Attacks Classification
- Network Design for security
- Firewall
- IDS/IPS
- SIEM
- (D)DOS
- iptables
- snort
- nmap
- hping
Basic Cryptography
Blockchain