Cyber Security – Ethical Hacking

8,900.00 (Inc. GST)

SKU: N/A Category:

This course is designed for students interested in pursuing a career in Cyber Security, Network Security, or as a Security Analyst. The Certified Ethical Hacker (CEH) program provides a comprehensive understanding of ethical hacking techniques, information systems security auditing, and the latest security threats. The course focuses on advanced attack vectors, practical demonstrations of hacking methodologies, tools, tricks, and security measures. By the end of this course, students will have a thorough understanding of network, web, and mobile security.

Course Features:

  • Learn the latest hacking techniques and methodologies.
  • Understand the latest security threats and how to mitigate them.
  • Hands-on demonstrations of hacking tools and security measures.
  • Focus on real-world applications of ethical hacking in network, web, and mobile security.

Prerequisites:

  • Basic computer knowledge.

Key Learning Outcomes:

Upon completion of this course, students will be able to:

  • Understand the fundamentals of network, web, and mobile security.
  • Identify and prevent cyber threats using ethical hacking techniques.
  • Gain hands-on experience with hacking tools and security measures.
  • Assess security vulnerabilities in systems and develop strategies to mitigate risks.
  • Apply ethical hacking methodologies to real-world scenarios.

Target Audience:

  • Students aspiring to work in Cyber Security or Network Security Analyst roles.
  • Anyone interested in learning about ethical hacking and how to protect systems from cyber threats.
  • M. Tech/B. Tech/MCA/BCA/Any Graduate or Diploma Holder.
  • Ideal for students looking to work in top-tier IT companies like TCS, Infosys, Microsoft, Samsung, Google, Amazon, Facebook, Wipro, and other leading MNCs.

Test & Evaluation:

  • Participants will be required to complete all assignments provided during the course for better learning.
  • A final assessment will be conducted at the end of the program to evaluate progress and understanding.

Certification:

  • Successful participants will receive a Certificate of Completion.
  • A Project Letter will be awarded upon the successful completion of the project.
  • Students who leave the course midway or do not complete it will not receive any certification.

Delivery Mode & Duration:

  • Mode: Online Live Sessions
  • Duration: 120 Hours (60 Hours of Online Live Sessions + 60 Hours of Assignments)

Additional information

Centre for Summer Training

IIT Kanpur Campus, Online Live

Batch Date

Batch 1, Batch 2

Curriculum

Module 1 – Introduction to Ethical Hacking

  • Introduction to Ethical Hacking
  • What is hacking?
  • Incident management process
  • Penetration testing
  • Information security

 Module 2 – Foot printing and Reconnaissance

  • What is Foot printing and Reconnaissance?
  • Various types of foot printing
  • Foot printing tools
  • Foot printing countermeasures

 Module 3 – Scanning Networks

  • Network scanning techniques
  • Scanning countermeasures

Module 4 – Enumeration

  • Enumeration techniques
  • Enumeration countermeasures

 Module 5 – Vulnerability Analysis

  • Vulnerability Analysis using different tools

Module 6 – System Hacking

  • System hacking methodology
  • Steganography
  • Steganalysis attacks
  • Covering tracks

Module 7 – Malware Threats

  • Different types of Trojans
  • Trojan analysis
  • Trojan Countermeasures.
  • Working of viruses.
  • Virus analysis
  • Computer worms
  • Malware analysis

Module 8 – Sniffing

  • Packet sniffing techniques
  • How to defend against sniffing

Module 9 – Social Engineering

  • Social Engineering techniques
  • Identify theft
  • Social engineering countermeasures

Module 10 – Denial-of-Service

  • DoS/DDoS attack techniques
  • Botnets
  • DDoS attack tools
  • And DoS/DDoS countermeasures

Module 11 – Session Hijacking

  • Session hijacking techniques
  • Session hijacking countermeasures

 Module 12 – Hacking Webservers

  • Different types of webserver attacks
  • Attack methodology
  • Hacking Webserver Countermeasures

Module 13 – Hacking Web Applications

  • Different types of web application attacks
  • Web application hacking methodology
  • Web application  countermeasure

Module 14 – Hacking Wireless Networks

  • Wireless Encryption
  • Wireless hacking methodology
  • Wireless hacking tools
  • Wi-Fi security tools

Module 15 – Hacking Mobile Platforms

  • Mobile platform attack vector
  • Android vulnerabilities
  • Jail breaking IOS
  • Windows phone 8 vulnerabilities
  • Mobile security guidelines

Module 16 – Evading IDS, Firewalls and Honeypots

  • Firewall
  • IDS and honeypot evasion techniques
  • Evasion tools
  • Countermeasures

Module 17- SQL Injection

  • SQL injection attacks
  • Injection detection tools

Module 18- IOT Hacking

  • What attacks are for IOT
  • Secure IOT Devices

Module 19- Cloud Computing

  • Cloud computing concepts
  • Attacks, and security techniques

Module 20- Cryptography

  • Different types of cryptography ciphers
  • Public Key Infrastructure
  • Cryptography attacks
  • Cryptanalysis tools

Module 21: Final Assessment and Project

  • Participants will undertake a final practical assessment to demonstrate their skills and understanding of ethical hacking techniques.
  • A hands-on project to test real-world hacking and security measures.

Enquiry