DAY 1
- Implement Caesar Cipher technique
- Implement Vigenere Cipher technique
- Implement Vernam Cipher technique
- Use network reconnaissance tools like WHOIS, dig, traceroute, nslookup to gather information about networks and domain registrars.
- Write a C program that contains a string (char pointer) with a value \Hello World’. The program should XOR each character in this string with 0 and display the result.
DAY 2
- Implement DES Algorithm
- Implement RSA Algorithm
- Analyze basic networking and Security commands with examples
- How to do subnetting and how to calculate subnet mask
DAY 3
- Implement Diffie-Hellman key exchange algorithm
- Implement MD5 Algorithm
- Analyze various Cyber and Network Security Attacks
- Analyzing headers using MXtoolbox tool
- Installation of root kits and study about the variety of options
- Analyze various security vulnerabilities of E-Mail Applications
DAY 4
- Implement SHA-1 Algorithm
- Implement DSA Algorithm
- Demonstrate how to provide secure data storage, secure data transmission and for creating digital signatures (GnuPG).
- Setup a honey pot and monitor the honey pot on network (KF Sensor)
- Demonstrate intrusion detection system (ids) using any tool (snort or any other s/w)
DAY 5
- Practice Malware analysis using ANY.RUN
- Analyze features of firewall in providing network security and to set Firewall Security in windows
- Analyze Security Vulnerabilities of E-commerce services
- Use NMAP with different options to scan open ports, perform OS fingerprinting, do a ping scan, tcp port scan, udp port scan, etc
- Write a C program that contains a string (char pointer) with a value \Hello World’. The program should AND or and XOR each character in this string with 127 and display the result.