GPPC- Digital Forensics and Cybersecurity
Master techniques to understand and combat cybersecurity threats, application security, web application penetration testing, and effective defensive strategies for real-world scenarios.
With the Cybersecurity and Digital Forensics course, students gain valuable skills in both defensive and offensive cybersecurity, supported by hands-on experience through collaborations with the Cybersecurity Research Hub and Bhairav Tech.
Students will approach businesses lacking digital presence, create and manage their social media profiles, and implement effective digital strategies to help these businesses flourish online. They’ll also empower business owners by teaching them how to digitally market their products, making a real impact while gaining invaluable experience in the field.
The Cybersecurity Research Hub, Nepal's first and only Educational cybersecurity Research Hub is dedicated to advancing cybersecurity knowledge through research and innovation.
Vairav Tech, known as the “Gurkhas of cybersecurity” in Nepal, specializes in data protection, security testing, and risk management
These collaborations offer students a unique opportunity to apply their learning in a real-world setting, making them adept at identifying, analyzing, and mitigating cybersecurity threats.
L01: Define the key principles and operational tactics of Red Teaming and differentiate between Red Team and Blue Team operations.
L02: Analyze famous Red Team operations and evaluate their ethical considerations.
L03: Identify and assess common application security vulnerabilities, applying secure coding practices to mitigate risks.
L04: Explain the architecture of web applications and describe common attack methods (e.g., SQL injection, XSS, CSRF).
L05: Conduct web application penetration testing using tools such as OWASP ZAP, Burp Suite, and SQLMap, from reconnaissance to exploitation.
L06: Set up a secure testing environment and generate vulnerability reports.
L07: Apply passive and active reconnaissance techniques to gather information about targets using tools such as Nmap, Whois, and TheHarvester.
L08: Conduct Open Source Intelligence (OSINT) investigations using platforms like DNSdumpster and Shodan to uncover security vulnerabilities.
L09: Utilize exploitation frameworks such as Metasploit to identify and exploit vulnerabilities in networks and applications.
L10: Understand how to leverage SQLMap for database exploitation and analyze the importance of vulnerability databases like CVE and NVD.
L11: Explain the role and operations of a Security Operations Center (SOC) and utilize SIEM platforms such as Splunk for monitoring and threat detection.
L12: Configure and manage firewalls (e.g., Simplewall, pfSense) and intrusion detection/prevention systems to protect networks and applications.
L13: Understand the incident response lifecycle, including detection, containment, and recovery, and participate in post-incident reviews.
L14: Use GitLab to generate, manage, and track incident tickets, ensuring proper documentation and response coordination within SOC teams.
L15: Recognize ethical challenges in Red Teaming, web application security testing, and SOC operations, ensuring adherence to legal and professional standards.
L16: Evaluate real-world case studies to understand the ethical implications of cybersecurity breaches and response strategies
Join 18000+ students who already have a head start. Enroll now to get free tutorials, hacks, study tips and learning resources delivered to you AND GRAB YOUR CHANCE TO
For Free Tutorials fill the form below.