Cyber Security – Ethical Hacking
Original price was: ₹8,999.00.₹7,999.00Current price is: ₹7,999.00.
Description
This course is designed for students interested in pursuing a career in Cyber Security, Network Security, or as a Security Analyst. The Certified Ethical Hacker (CEH) program provides a comprehensive understanding of ethical hacking techniques, information systems security auditing, and the latest security threats. The course focuses on advanced attack vectors, practical demonstrations of hacking methodologies, tools, tricks, and security measures. By the end of this course, students will have a thorough understanding of network, web, and mobile security.
Course Features:
- Learn the latest hacking techniques and methodologies.
- Understand the latest security threats and how to mitigate them.
- Hands-on demonstrations of hacking tools and security measures.
- Focus on real-world applications of ethical hacking in network, web, and mobile security.
Prerequisites:
- Basic computer knowledge.
Key Learning Outcomes:
Upon completion of this course, students will be able to:
- Understand the fundamentals of network, web, and mobile security.
- Identify and prevent cyber threats using ethical hacking techniques.
- Gain hands-on experience with hacking tools and security measures.
- Assess security vulnerabilities in systems and develop strategies to mitigate risks.
- Apply ethical hacking methodologies to real-world scenarios.
Target Audience:
- Students aspiring to work in Cyber Security or Network Security Analyst roles.
- Anyone interested in learning about ethical hacking and how to protect systems from cyber threats.
- M. Tech/B. Tech/MCA/BCA/Any Graduate or Diploma Holder.
- Ideal for students looking to work in top-tier IT companies like TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro, and other leading MNCs.
Test & Evaluation:
- Participants will be required to complete all assignments provided during the course for better learning.
- A final assessment will be conducted at the end of the program to evaluate progress and understanding.
Certification:
- Successful participants will receive a Certificate of Completion.
- A Project Letter will be awarded upon the successful completion of the project.
- Students who leave the course midway or do not complete it will not receive any certification.
Delivery Mode & Duration:
- Mode: Online Live Sessions
Duration: 120 Hours (60 Hours of Online Live Sessions + 60 Hours of Assignments)
Module 1: Introduction to Networking:
- OSI Model
- TCP/IP Model
- IP Addressing
- CIDR
- Application Layer Protocols
Module 2 – Introduction to Ethical Hacking
● Introduction to Ethical Hacking
● What is hacking?
● Incident management process
● Penetration testing
● Information security
Module 3 – Foot printing and Reconnaissance
● What is Foot printing and Reconnaissance?
● Various types of foot printing
● Foot printing tools
● Foot printing countermeasures
Module 4 – Scanning Networks
● Network scanning techniques
● Scanning countermeasures
Module 5 – Enumeration
● Enumeration techniques
● Enumeration countermeasures
Module 6 – Vulnerability Analysis
● Vulnerability Analysis using different tools
Module 7 – System Hacking
● System hacking methodology
● Steganography
● Steganalysis attacks
● Covering tracks
Module 8 – Malware Threats
● Different types of Trojans
● Trojan analysis
● Trojan Countermeasures.
● Working of viruses.
● Virus analysis
● Computer worms
● Malware analysis
Module 9 – Sniffing
● Packet sniffing techniques
● How to defend against sniffing
Module 10 – Social Engineering
● Social Engineering techniques
● Identify theft
● Social engineering countermeasures
Module 11 – Denial-of-Service
● DoS/DDoS attack techniques
● Botnets
● DDoS attack tools
● And DoS/DDoS countermeasures
Module 12 – Session Hijacking
● Session hijacking techniques
● Session hijacking countermeasures
Module 13 – Hacking Webservers
● Different types of webserver attacks
● Attack methodology
● Hacking Webserver Countermeasures
Module 14 – Hacking Web Applications
● Different types of web application attacks
● Web application hacking methodology
● Web application countermeasure
Module 15 – Hacking Wireless Networks
● Wireless Encryption
● Wireless hacking methodology
● Wireless hacking tools
● Wi-Fi security tools
Module 16 – Hacking Mobile Platforms
● Mobile platform attack vector
● Android vulnerabilities
● Jail breaking IOS
● Windows phone 8 vulnerabilities
● Mobile security guidelines
Module 17 – Evading IDS, Firewalls and Honeypots
● Firewall
● IDS and honeypot evasion techniques
● Evasion tools
● Countermeasures
Module 18- SQL Injection
● SQL injection attacks
● Injection detection tools
Module 19- IOT Hacking
● What attacks are for IOT
● Secure IOT Devices
Module 20- Cloud Computing
● Cloud computing concepts
● Attacks, and security techniques
Module 21- Cryptography
● Different types of cryptography ciphers
● Public Key Infrastructure
● Cryptography attacks
● Cryptanalysis tools
Module 22: Final Assessment and Project
- Participants will undertake a final practical assessment to demonstrate their skills and understanding of ethical hacking techniques.
- A hands-on project to test real-world hacking and security measures.
You can also give us a call on Mobile +91-9335469335





