Course Overview

Cybersecurity is important because it protects all categories of data from theft and damage. Ethical Hacking.

The Ethical Hacking Program provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.

Course Objectives

The objective of the course is to train on the basics of Information Security and prepare for the Certified Ethical Hacking (CEH) certification from EC-Council and PenTest+ Certification from CompTIA.

 

Learning Outcomes

At the end of the course, the students would be ready to give the Certified Ethical Hacker (CEH) Certification Test from EC-Council and the PenTest+ Certification Test from CompTIA.

The students will be trained for the below job roles in the industry:

 

Course Curriculum

Module 1 – Network Fundamentals & Operating Systems

 

Module 2 – Cyber Security Fundamentals

 

Module 3 – Threats, Attacks & Vulnerabilities

 

Module 4 – Introduction to Ethical Hacking

 

Module 5 – Reconnaissance

 

Module 6 – Scanning Networks

 

Module 7 – Enumeration

 

Module 8 – Vulnerability Analysis

 

Module 9 – System Hacking

 

Module 10 – Malware Threats 

 

Module 11 – Sniffing

 

Module 12 – Social Engineering

 

Module 13 – Denial-of-Service

 

Module 14 – Session Hijacking

 

Module 15 – Evading IDs, Firewalls & Honeypots

 

Module 16 – Hacking Web Servers

 

Module 17 – Hacking Web Applications

 

Module 18 – SQL Injection

 

Module 19 – Hacking Wireless Networks

 

Module 20 – Hacking Mobile Networks

 

Module 21 – IoT Hacking

 

Module 22 – Cloud Computing

 

Module 23 – Cryptography