Sale!

Cyber Security ( Ethical Hacking)

10,500.00 +GST

Rs. 15,500.00 – Rs. 10,500.00/-

SKU: N/A Category:

This course is designed for a student who wants to go in field of Cyber Security or Network Security Analyst. CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

Key Learning Outcomes:

  • After completing this course, you will be able to know about network, web and mobile security

Prerequisites:

  • Basic Computer Knowledge

Target Audience:

  • Students who want to get selected in Top-Tier IT Companies like TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro and all leading MNC’s of the world.
  • M. Tech/B. Tech/MCA/BCA/Any Graduate or Diploma Holder

Test & Evaluation:

  • During the program, the participants will have to take all assignments given to them for better learning.
  • At the end of the program, a final assessment will be conducted

Certification:

  • All successful participants will be provided with a certificate of completion.
  • Students who do not complete the course / leave it midway will not be awarded any certificate.

Delivery Mode & Duration :

  • Classroom Training- 100 Hours (40 Hours classroom sessions + 60 Hours of assignment)
  • Online Live Mode- 100 Hours (40 Hours Online Live sessions + 60 Hours of assignment)

Additional information

Program Mode

100% online LIVE, Classroom (Hybrid Mode)

Batches

Slot 1 : 1st June 2024 – 5th July 2024, Slot 1 : 20th May 2024 – 20th June 2024, Slot 2 : 1st July 2024 – 5th August 2024, Slot 2 : 22nd June 2024 – 23rd July 2024

Curriculum

Module 1 – Introduction to Ethical Hacking

  • Introduction to Ethical Hacking
  • What is hacking?
  • Incident management process
  • Penetration testing
  • Information security

Module 2 – Foot printing and Reconnaissance

  • What is Foot printing and Reconnaissance?
  • Various types of foot printing
  • Foot printing tools
  • Foot printing countermeasures

 Module 3 – Scanning Networks

  • Network scanning techniques
  • Scanning countermeasures

Module 4 – Enumeration

  • Enumeration techniques
  • Enumeration countermeasures

Module 5 – Vulnerability Analysis

  • Vulnerability Analysis using different tools

Module 6 – System Hacking

  • System hacking methodology
  • Steganography
  • Steganalysis attacks
  • Covering tracks

Module 7 – Malware Threats

  • Different types of Trojans
  • Trojan analysis
  • Trojan Countermeasures.
  • Working of viruses.
  • Virus analysis
  • Computer worms
  • Malware analysis

Module 8 – Sniffing

  • Packet sniffing techniques
  • How to defend against sniffing

Module 9 – Social Engineering

  • Social Engineering techniques
  • Identify theft
  • Social engineering countermeasures

Module 10 – Denial-of-Service

  • DoS/DDoS attack techniques
  • Botnets
  • DDoS attack tools
  • And DoS/DDoS countermeasures

Module 11 – Session Hijacking

  • Session hijacking techniques
  • Session hijacking countermeasures

Module 12 – Hacking Webservers

  • Different types of webserver attacks
  • Attack methodology
  • Hacking Webserver Countermeasures

Module 13 – Hacking Web Applications

  • Different types of web application attacks
  • Web application hacking methodology
  • Web application  countermeasure

Module 14 – Hacking Wireless Networks

  • Wireless Encryption
  • Wireless hacking methodology
  • Wireless hacking tools
  • Wi-Fi security tools

Module 15 – Hacking Mobile Platforms

  • Mobile platform attack vector
  • Android vulnerabilities
  • Jail breaking IOS
  • Windows phone 8 vulnerabilities
  • Mobile security guidelines

Module 16 – Evading IDS, Firewalls and Honeypots

  • Firewall
  • IDS and honeypot evasion techniques
  • Evasion tools
  • Countermeasures

Module 17- SQL Injection

  • SQL injection attacks
  • Injection detection tools

Module 18- IOT Hacking

  • What attacks are for IOT
  • Secure IOT Devices

Module 19- Cloud Computing

  • Cloud computing concepts
  • Attacks, and security techniques

Module 20- Cryptography

  • Different types of cryptography ciphers
  • Public Key Infrastructure
  • Cryptography attacks
  • Cryptanalysis tools

Enquiry

Sample Certificate