Learn from Certified Experts

Get Recorded Sessions

Earn Certificate of Completion

Get Career Guidance & Mentorship

Course Content

Security Foundations: "Securing Your World: A Guide to Information Security"
  • What is Information Security?
  • Principles of Information Security
  • Elements of Information Security - CIA Triad
  • Attacker Types
  • Attacking Methodology
  • Information Security Controls
Kali Linux Essentials: "Command-Line of Penetration Testing"
  • Introduction to Kali Linux
  • Basic Linux Commands
  • Manipulation of Texts
  • Finding Files
  • File Management Commands
  • Text Editors - Nano, Vim, Mousepad
  • Searching, Installing, and Removing Tools
  • Downloading Files
Ethical Hacking: "Unleashing Your Inner Hacker"
  • Ethical Hacking Concepts
  • Hacking Motives
  • Ethical Hacking Phases
    1. Reconnaissance
    2. Scanning
    3. Enumeration
    4. Hacking
  • Password Cracking
  • Privilege Escalation
  • Vulnerability Assessment
Web Application Security: "Hacking the Web"
  • Introduction to web applications
  • Basics of HTTP
  • Status codes and Headers of HTTP
  • Setting up the Burpsuite
  • Exploiting Web Application - OWASP Top 10
Introduction to Threat Intelligence & Outsmarting the Enemy
  • Introduction to Threat Intelligence
  • Types of Threat Intelligence
    1. Strategic
    2. Tactical
    3. Operational
    4. Technical
  • Enhanced Detection with Threat Intelligence
  • Lockheed Martin - Cyber Kill Chain
Incident Response: "Responding to Cybersecurity Threats"
  • What is Incident Response
  • Phases of Incident Response
  • Communication Plan
  • What is Playbook
  • Incident Response Exercises using Wireshark
Digital Forensics: "Uncovering the Truth"
  • Introduction to Digital Forensics
  • Types of Forensics Computer
    1. Network
    2. Memory
    3. Mobile
  • Why it is Useful?
  • Evidence and its Types
  • Chain of Custody
  • Order of Volatility
Cryptography: "Protecting Your Data"
  • Cryptography concepts
  • Encryption and its types
  • Hashing and its working
  • Digital Signatures
  • Digital Certificates

Meet Our Expert

Abhishek Sharma

An Information Security Consultant and Trainer, Abhishek is experienced in delivering training to government and non-government organizations around the globe on different Information Security verticals.

Abhishek has provided training and consultancy to learners as well as organizations on the latest Information Security technologies available in the market today. He’s got exposure in managing Information Security for different sectors including banking, telecom, e-Commerce, retail, healthcare and IT among others.

Start Learning Now

Who Should Take the Cybersecurity Orientation Program?

Beginners and professionals who wish to start a career in cybersecurity and learn about its key concepts, must attend this free cybersecurity online program.

Why Enroll for this Cybersecurity Course from Infosec Train?

We specialize in cybersecurity training and certification courses with authorizations from top cybersecurity vendors such as EC-Council, CompTIA, ISACA among others.

We regularly offer free of cost awareness training and webinars on the latest cybersecurity topics in the industry.

We have a vast portfolio of professional cybersecurity courses that span across domains and verticals.

Our trainers are highly qualified and subject matter experts in their respective domains.

We are one of the leaders in the security training industry and cater to markets across the globe.

Secure Your Place Now