Online Cyber Security & Ethical Hacking Certification
Course Outline
The method and process to protect information and information systems from unauthorized access, the disclosure of information, usage or modification. Information security ensures the confidentiality, integrity, and availability. An organization without security policies and appropriate security rules are at great risk, and the confidential information and data related to that organizations are not secure in the absence of these security policies.
Learning of Students Include:
- Essential Terminologies
- Elements of Information Security
- The Security, Functionality, and Usability
- Information Security Threats and Attack Vectors
- Cloud Computing Threats
- Advance persistent threats
- Viruses and Worms
- Mobile Threats
- Insider Attack
Routing and Networks Basics
- IP Routing
- VPN
- IPV6
- Firewall
- IDS/IPS
Cyber Security and Organizations
- Enterprise Information Security Architecture (EISA)
Introduction to Ethical Hacking
- Essential element of Information Security
- Types of Hacker/ Hacking
- Types of Attacks
- Phases of Hacking
Hacking Methodologies
Foot Printing
- Definition and description of Foot printing
- Objectives and types
Network Scanning
- Methodology of Network Scanning
- Types of Network Scanning
- OS Fingerprinting
- Banner Grabbing
- Vulnerability Scanning
Enumeration
- Defining Enumeration
- Techniques
- Web Enumeration
- Countermeasures
System Hacking
- Defining System Hacking
- Types of System Hacking
- Steganography and its types
- Steganalysis
Trojan, Virus and Worms
- Definition and types of Trojans
- Virus and its effects on computers
- Virus analysis tools
- Worms
- Virus detection method
Sniffing
- Definition
- Working of Sniffers
- Packet Sniffing
- Detection of Sniffing
DoS Attack
- Concept of DoS
- Symptoms of DoS attack
- Botnets
- Buffer over flow
- Countermeasures
Session Hijacking
- Definition
- Types of session Hijacking
- TCP/IP hijacking
- Countermeasures
Web server and Web Application Attacks, SQL Injection
- Understanding Webserver
- Web Application Attacks
- SQL Injection
Wireless Network Hacking
- Understanding Wireless Network
- Types of Wireless Network
- WEP
- Security Auditing Tools
Evading IDS, Firewalls and Honeypots
- Understanding Intrusion Detection System
- Understanding Firewalls
- Understanding Honeypots
- Evasion of IDS, Firewalls and Honeypots
Mobile Hacking
- Understanding Mobile Platforms Attacks
- Mobile Device Management
- Guidelines and tools for mobile security
Social Engineering and Human Factor
- Understanding Social Engineering
- Phases of Social Engineering
- Warning Signs
- Types and Techniques of Social Engineering
IoT’s and Mobile Platforms
- Enabling Technologies for IoTs
- IoTs Security
Cryptography
- Understanding Cryptography
- Cryptanalysis Tools