Cyber Security – Ethical Hacking
₹5,999.00
Description
Overview
This Course is for the students and professionals who want to start their carrier in Cyber Security. It all about attacks and their countermeasures at different levels for different devices and operating systems.
Prerequisites:
No Prerequisite
Key Learning Outcomes:
Today we are living in a cyber world, mostly we are using online for our luxurious life. As much as online things are increasing, attackers are becoming more and more active. by completing this course, we will be able to see the techniques used by attackers to gain unauthorized access to system, website, mobile phones, networks, etc. We are also going to learn penetration testing and vulnerability assessment of network and devices. This course is for tighten of security of our network and devices.
Target Audience
This course is ideal for anyone who wishes to learn the details of Cyber Security and its best practices.
Test & Evaluation
- During the program, the participants will have to take all assignments given to them for better learning.
- At the end of the program, a final assessment will be conducted
Certification
- All successful participants will be provided with a certificate of completion.
- Students who do not complete the course / leave it midway will not be awarded any certificate.
Duration
100 hours (40 hours ONLINE LIVE sessions + 60 Hours of assignment)
Delivery Mode:
Online Live Instructor led learning.
Module 1 – Introduction to Ethical Hacking
- Introduction to Ethical Hacking
- What is hacking?
- Incident management process
- Penetration testing
- Information security
Module 2 – Foot printing and Reconnaissance
- What is Foot printing and Reconnaissance?
- Various types of foot printing
- Foot printing tools
- Foot printing countermeasures
Module 3 – Scanning Networks
- Network scanning techniques
- Scanning countermeasures
Module 4 – Enumeration
- Enumeration techniques
- Enumeration countermeasures
Module 5 – Vulnerability Analysis
- Vulnerability Analysis using different tools
Module 6 – System Hacking
- System hacking methodology
- Steganography
- Steganalysis attacks
- Covering tracks
Module 7 – Malware Threats
- Different types of Trojans
- Trojan analysis
- Trojan Countermeasures.
- Working of viruses.
- Virus analysis
- Computer worms
- Malware analysis
Module 8 – Sniffing
- Packet sniffing techniques
- How to defend against sniffing
Module 9 – Social Engineering
- Social Engineering techniques
- Identify theft
- Social engineering countermeasures
Module 10 – Denial-of-Service
- DoS/DDoS attack techniques
- Botnets
- DDoS attack tools
- And DoS/DDoS countermeasures
Module 11 – Session Hijacking
- Session hijacking techniques
- Session hijacking countermeasures
Module 12 – Hacking Webservers
- Different types of webserver attacks
- Attack methodology
- Hacking Webserver Countermeasures
Module 13 – Hacking Web Applications
- Different types of web application attacks
- Web application hacking methodology
- Web application countermeasure
Module 14 – Hacking Wireless Networks
- Wireless Encryption
- Wireless hacking methodology
- Wireless hacking tools
- Wi-Fi security tools
Module 15 – Hacking Mobile Platforms
- Mobile platform attack vector
- Android vulnerabilities
- Jail breaking IOS
- Windows phone 8 vulnerabilities
- Mobile security guidelines
Module 16 – Evading IDS, Firewalls and Honeypots
- Firewall
- IDS and honeypot evasion techniques
- Evasion tools
- Countermeasures
Module 17- SQL Injection
- SQL injection attacks
- Injection detection tools
Module 18- IOT Hacking
- What attacks are for IOT
- Secure IOT Devices
Module 19- Cloud Computing
- Cloud computing concepts
- Attacks, and security techniques
Module 20- Cryptography
- Different types of cryptography ciphers
- Public Key Infrastructure
- Cryptography attacks
- Cryptanalysis tools
You can also give us a call on Mobile +91-9335469335