Online Cyber Security & Ethical Hacking Certification

Course Outline

The method and process to protect information and information systems from unauthorized access, the disclosure of information, usage or modification. Information security ensures the confidentiality, integrity, and availability. An organization without security policies and appropriate security rules are at great risk, and the confidential information and data related to that organizations are not secure in the absence of these security policies.

Learning of Students Include:

  • Essential Terminologies
  • Elements of Information Security
  • The Security, Functionality, and Usability
  • Information Security Threats and Attack Vectors
    • Cloud Computing Threats
    • Advance persistent threats
    • Viruses and Worms
    • Mobile Threats
    • Insider Attack

Routing and Networks Basics

    • IP Routing
    • VPN
    • IPV6
    • Firewall
    • IDS/IPS

Cyber Security and Organizations

    • Enterprise Information Security Architecture (EISA)

Introduction to Ethical Hacking

    • Essential element of Information Security
    • Types of Hacker/ Hacking
    • Types of Attacks
    • Phases of Hacking

Hacking Methodologies

Foot Printing

    • Definition and description of Foot printing
    • Objectives and types

Network Scanning

    • Methodology of Network Scanning
    • Types of Network Scanning
    • OS Fingerprinting
    • Banner Grabbing
    • Vulnerability Scanning

Enumeration

    • Defining Enumeration
    • Techniques
    • Web Enumeration
    • Countermeasures

System Hacking

    • Defining System Hacking
    • Types of System Hacking
    • Steganography and its types
    • Steganalysis

Trojan, Virus and Worms

    • Definition and types of Trojans
    • Virus and its effects on computers
    • Virus analysis tools
    • Worms
    • Virus detection method

Sniffing

    • Definition
    • Working of Sniffers
    • Packet Sniffing
    • Detection of Sniffing

DoS Attack

    • Concept of DoS
    • Symptoms of DoS attack
    • Botnets
    • Buffer over flow
    • Countermeasures

Session Hijacking

    • Definition
    • Types of session Hijacking
    • TCP/IP hijacking
    • Countermeasures
Web server and Web Application Attacks, SQL Injection
    • Understanding Webserver
    • Web Application Attacks
    • SQL Injection

Wireless Network Hacking

    • Understanding Wireless Network
    • Types of Wireless Network
    • WEP
    • Security Auditing Tools

Evading IDS, Firewalls and Honeypots

    • Understanding Intrusion Detection System
    • Understanding Firewalls
    • Understanding Honeypots
    • Evasion of IDS, Firewalls and Honeypots

Mobile Hacking

    • Understanding Mobile Platforms Attacks
    • Mobile Device Management
    • Guidelines and tools for mobile security

Social Engineering and Human Factor

    • Understanding Social Engineering
    • Phases of Social Engineering
    • Warning Signs
    • Types and Techniques of Social Engineering

IoT’s and Mobile Platforms

    • Enabling Technologies for IoTs
    • IoTs Security

Cryptography

    • Understanding Cryptography
    • Cryptanalysis Tools
  •  

Introduction to Prevention of Electronic Crime Act (PECA)