Cyber Security (WTP)

2,118.64 Taxes as Applicable(GST)

Course Overview

Duration : 100 Hours

This course is designed for students who wants to go in field of Computer Forensics or Digital Forensics. Computer Forensic is a comprehensive program focusing on latest way for data acquisition techniques and data retrieval techniques in forensically sound manner so that the evidence can be presented in the court. Real time demonstration of latest forensic techniques, methodologies, tools, tricks and integrity measures

Benefits of the course

  • After completing this course, you will be able to know about forensically handle data and retrieval of data from any evidence media.
  • You will be able to know about network, web and mobile security.
  • You will learn more about Hardware, Software.
  • You will be able to crack codes, hacked phones.

Targeted Audience

  • Students who want to learn Hacking and Ethical Hacking Concept.
  • Tech/B.Tech/MCA/BCA/Any Graduate or Diploma Holder
  • Who wants to be Site administrators?
  • Professionals

Materials Included

  • Prepare with comprehensive Topic-wise tutorial Materials
  • Highly Qualified and Experience Technical Team to help each trainee.
  • Small Batch Size for focused Learning path of the student.
  • Online Live Instructor led Learning



  • Basic Computer Knowledge
  • Basic Knowledge of Ethical Hacking Concepts
  • Keen to learn ethical hacking concepts


Session 1

  • Introduction to the term Networking
  • Types of Networks
  • OSI Model
  • Client/Server Configuration
  • Topologies
  • Media (Guided Media)
  • IP Address (IPv4, IPv6)
  • VLSM, CIDR, Subnetting (Network/Host)
  • Devices
  • Protocols
  • TCP/IP Applications and Services


Session 2

  • The module briefs about information security, information security threats and attack vectors.
  • Discusses various hacking concepts, type and phases.
  • Addresses the pre-requisites to become an ethical hacker and also the scope and limitations of ethical hacking.
  • Discusses various information security controls such as Information Assurance (IA), Defense- in-path, security policies, physical security, risk management, threat modelling, incident management, AI/ML, Etc.
  • Addresses the penetration testing process and security testing methodology
  • Discusses various information security acts and laws.

Session 3

  • Discusses foot printing terminologies.
  • Briefs on the foot printing methodologies such as foot printing through search engines, web services, social networking sites, social engineering, website foot printing, Email foot printing, competitive intelligence gathering, who is foot printing, DNS foot printing, etc.
  • Provides an assessment of various foot printing tools used to collect information regarding a system or network.
  • Discusses various foot printing countermeasures to defend against foot printing attracts.
  • escribes various penetration testing steps involved in foot printing.

Session 4

  • Discusses network scanning concepts
  • The module briefs on scanning methodology used to identify the hosts, ports, and services in a network that includes:
  • Checking for live systems and ports using various scanning techniques
  • Identifying services using various scanning techniques
  • IDS/firewall evasion techniques
  • Banner grabbing/OS fingerprinting
  • Drawing network diagrams of the vulnerable hosts
  • Provides an assessment of various scanning tools used to collect information regarding hosts, ports, and services in a network
  • Discusses various IP spoofing detection techniques
  • Discusses various penetration testing steps used to scan the network

Session 5

  • This module explains the process of extracting user names, machine names, network resources, shares, and services from a system
  • Describes the techniques for enumeration such as NetBIOS Enumeration, SNMP enumeration, LDAP enumeration, NTP enumeration, SMTP enumeration, DNS enumeration, IPsec enumeration, VoIP enumeration, RPC enumeration, and Unix/Linux user enumeration.
  • Lists the enumeration tools that can be used to extract the data
  • Discusses various enumeration countermeasures to defend against enumeration attacks
  • Assesses various penetration testing steps used to extract the data from a system

Session 6

  • Discusses vulnerability assessment concepts
  • Briefs the working of vulnerability scanning solutions and criteria for choosing those too Is
  • Describes the importance of vulnerability scoring systems in vulnerability assessment
  • Lists various tools used to perform vulnerability assessment
  • Discusses how to generate and analyze vulnerability assessment reports
  • Describes the CEH system hacking process which is classified into three stages: gaining access (by cracking passwords and escalating privileges), maintaining access (executing applications and hiding files), and clearing logs (covering tracks)
  • Explains the hacking tools (keyloggers, spywares, and rootkits, etc.) that aid the hacking process
  • Discusses various steganography techniques for hiding a secret message
  • Explains various steganalysis methods and steganography detection tools
  • Presents the countermeasures that can be applied at every stage to prevent an attack on the system

Session 7

  • Discusses various penetration testing steps
  • Discusses various malware and malware propagation techniques
  • Discusses Trojans and viruses, their types, and how they infect files/systems
  • Lists some of the latest Trojans that are used to infect a system
  • Discusses worms that can compromise a business or system’s security
  • Explains the static and dynamic malware analysis process
  • Briefs on the various methods of virus detection
  • Discusses various countermeasures to defend against malware attacks
  • Lists anti-malware tools
  • Assesses various malware penetration testing steps

Session 8

  • Briefs about the basic concepts of sniffing network and various types of sniffing
  • Discusses various sniffing techniques such as MAC attack, DHCP attack, ARP poisoning, DNS poisoning etc.
  • Discusses on how to defend against various sniffing attacks
  • Features various sniffing tools and explains how an attacker hacks a network using them
  • Lists a number of countermeasures to defend against sniffing
  • Explains various sniffing detection methods and tools
  • Discusses various penetration testing steps

Session 9

  • Introduces social engineering concepts and various attack phases
  • Describes the different types of social engineering with examples
  • Explains various types of insider threats
  • Explains in detail how impersonation on social engineering sites is carried out
  • Briefs how attackers obtain and exploit personally identifiable information and authenticate themselves, in order to impersonate victim
  • Lists various social engineering, insider threats, and identity theft countermeasures
  • Lists anti-phishing tools to detect phishing emails and websites
  • Tabulates common social engineering tactics and proposes combat strategies to prevent such attacks
  • Talks about social engineering penetration testing

Session 10

  • This module explains DoS/DDoS attacks, the classification of DoS/DDoS attacks, and various attack techniques
  • Discusses Botnets, the types of bots, and how they infect the system
  • Demonstrates various tools to perform DoS and DDoS attacks
  • Discusses various techniques to detect, prevent, and mitigate DoS/DDoS attacks
  • Briefs about various post-attack forensic methods
  • Explains various techniques to defend against botnets
  • Lists various DoS/DDoS protection tools
  • Explains countermeasures to prevent DoS/DDoS attacks and pen testing steps

Session 11

  • This module explains session hijacking concepts
  • Discusses about network and application-level session hijacking
  • Explains various session hijacking tools
  • Explains various session hijacking detection methods and tools
  • Explains countermeasures to prevent session hijacking attacks
  • Discusses various approaches vulnerable to session hijacking and their preventative solutions
  • Discusses various penetration testing steps involved in session hijacking

Session 12

  • This module gives an introduction to IDS, firewall and honeypot concepts and types
  • Demonstrates various IDS, firewall and honeypot solutions
  • Describes various IDS and firewall evasion techniques
  • Explains various techniques to detect and defeat honeypots
  • Lists various IDS/firewall evasion tools and honeypot detection tools
  • Discusses the countermeasures to defend against IDS/firewall evasion
  • Discusses various penetration testing steps involved in in firewall/IDS penetration testing

Session 13

  • Explains open-source web server and IIS architecture
  • Discusses various reasons why web servers are compromised
  • Demonstrates various key web server attack techniques and tools
  • Discusses about web server attack methodology and tools
  • Discusses various methods to detect web server hacking attempts
  • Explains countermeasures to prevent web server attacks
  • Explains what is patch management and associated concepts
  • Lists various web server security tools
  • Discusses various penetration testing steps involved in web server pen testing

Session 14

  • This module gives an introduction to web application architecture and demonstrates how web applications work?
  • Lists and explains various web application threats and attacks
  • Explains web application hacking methodology
  • Demonstrates various web application hacking tools
  • Discusses countermeasures to defend against web application attacks
  • Demonstrates various web application security tools
  • Discusses various penetration testing steps and tools involved in web application pen testing

Session 15

  • This module gives an introduction to SQL Injection and threats from SQL injection attacks
  • Explains various types of SQL injection attacks with examples
  • Explains SQL injection methodology
  • Demonstrates various SQL injection and detection tools
  • Explains various evasion techniques
  • Explains countermeasures to prevent SQL injection attacks

Session 16

  • The module gives an introduction to wireless terminologies, types, standards, etc.
  • Discusses the types of wireless encryption and their working
  • Lists and explains various wireless threats
  • Describes wireless hacking methodology
  • Demonstrates various wireless hacking tools
  • Discusses about Bluetooth hacking, threats, and Bluetooth hacking tools
  • Discusses how to defend against wireless attacks
  • Illustrates various wireless security tools
  • Discusses various penetration testing steps and tools involved in wireless penetration testing

Session 17

  • This module discusses mobile platform attack vectors in detail and explores app sandboxing issues
  • Discusses Android OS architecture briefly and demonstrates hacking android OS using various tools
  • Illustrates working of various Android Trojans and guidelines for securing Android devices
  • Gives a brief knowledge on jailbreaking iOS, its types, techniques and tools required for jailbreaking
  • Illustrates various iOS Trojans and guidelines for securing iOS devices
  • Discusses about different mobile spyware
  • Explains about mobile device management and solutions for mobile device management
  • Lists guidelines for BYOD security
  • Provides brief knowledge on mobile security guidelines and lists various mobile security tools
  • Discusses various penetration testing steps involved in pen testing for Android phones and I Phones

Session 18

  • This module gives an introduction to IoT concepts
  • Briefs about various IoT challenges and security problems
  • Discusses about various IoT threats and attack surface areas
  • Tabulates various IoT attacks in different sectors
  • Discusses the IoT hacking methodology and various IoT hacking tools
  • Discusses various countermeasures to prevent IoT hacking
  • Explains security considerations for IoT framework
  • Lists various IoT security tools
  • discusses various steps involved in IoT pen testing


Session 19

  • Briefs about the basic concepts of cloud computing and various types of cloud computing services
  • Explains the importance of virtualization in cloud computing
  • Lists and explains various threats of cloud computing
  • Discusses various cloud computing attacks
  • Briefs about various cloud computing security considerations
  • Discusses best practices for securing cloud
  • Discusses various cloud security tools
  • Explains various key considerations for pen testing in the cloud
  • discusses various steps involved in cloud penetration testing

Session 20

  • This module gives an introduction to cryptography concepts
  • Discusses the types of cryptography and their working process
  • Discusses about ciphers and its types
  • Explains various encryption algorithms with examples
  • Discusses various hashing algorithms and lists various hash calculators
  • Lists and features various cryptography tools
  • Explains Public Key Infrastructure (PKI) and its components
  • Discusses email encryption, disk encryption, and cryptography attacks
  • Briefs various cryptanalysis methods and lists various cryptanalysis tools
  • Explains how to defend against cryptographic attacks
General Information
  • Please ensure to use a secure internet connection.
  • Please ensure to check your details before submitting.
  • The discounts are applicable only on full payment.
  • You can use only one discount for a course in a particular program it can be either of the discounts as per the discount validity.
  • Ensure to use the proper discount code.
  • Gateway charges are as applicable.
  • In case of any transaction issue, please inform us by mailing at [email protected] or call us at 9335469335
  • Please ensure to note down your order id and transaction id at the time of communication with us.
  • All the payments are subject to realization.

Enquire Now