Course Highlights
  • 30 Hours of Online Learning
  • Upgrade your skills
  • Lifetime Learning
  • Earn Your Certification
Curriculum

7 Topics
Information Security Overview
Information Security Threats and Attack Vectors
Hacking Concepts
Ethical Hacking Concepts
Information Security Controls
Penetration Testing Concepts
Information Security Laws and Standards

9 Topics
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
WebsiteEmail DNS Network Whois Footprinting
Footprinting through Social Engineering
Footprinting Tools
Footprinting Countermeasures
Footprinting Pen Testing

6 Topics
Network Scanning Concepts
Scanning Tools & Techniques
Scanning Beyond IDS and Firewall
Banner Grabbing
Draw Network Diagrams
Scanning Pen Testing

7 Topics
Enumeration Concepts
NetBIOS Enumeration
SNMP LDAP NTP Enumeration
DNS Enumeration
Other Enumeration Techniques
Enumeration Countermeasures
Enumeration Pen Testing

3 Topics
Vulnerability Assessment Concepts & Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools & Reports

7 Topics
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Penetration Testing

5 Topics
Malware & Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Anti-Malware Software
Malware Penetration Testing

8 Topics
Sniffing Concepts
Sniffing Technique: MAC & DHCP Attacks
Sniffing Technique: ARP & DNS Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Tools
Countermeasures
Sniffing Detection Techniques
Sniffing Pen Testing

6 Topics
Social Engineering Concepts & Techniques
Insider Threats
Impersonation on Social Networking Sites
Identity Theft
Countermeasures
Social Engineering Pen Testing

5 Topics
DoS/DDoS Concepts & Techniques
Botnets
DoS/DDoS Attack Tools
Countermeasures
DoS/DDoS Protection Tools & Penetration Testing

5 Topics
Session Hijacking Concepts
Application Level & Network Level Session Hijacking
Session Hijacking Tools
Countermeasures
Penetration Testing

5 Topics
IDS Firewall and Honeypot Concepts & Solutions
Evading IDS & Firewalls
Detecting Honeypots
IDS/Firewall Evasion Countermeasures
Penetration Testing

5 Topics
Web Server Concepts
Web Server Attack Methodology & Tools
Patch Management
Web Server Security Tools
Web Server Pen Testing

7 Topics
Web App Concepts
Web App Threats
Hacking Methodology
Web App Hacking Tools
Countermeasures
Web App Security Testing Tools
Web App Pen Testings

6 Topics
SQL Injection Concepts
Types of SQL Injection
SQL Injection Methodology
SQL Injection Tools
Evasion Techniques
Countermeasures

9 Topics
Wireless Concepts
Wireless Encryption
Wireless Threats
Wireless Hacking Methodology
Wireless Hacking Tools
Bluetooth Hacking
Countermeasures
Wireless Security Tools
Wireless Pen Testing

7 Topics
Mobile Platform Attack Vectors
Hacking Android OS
Hacking iOS
Mobile Spyware
Mobile Device Management
Mobile Security Guidelines and Tools
Mobile Pen Testing

13 Topics
Cloud Computing Concepts
Cloud Computing Threats & Attacks
Cloud Security
Cloud Security Tools
Cloud Penetration Testing
Module - 19: Cryptography
Cryptography Concepts
Encryption Algorithms
Cryptography Tools
Public Key Infrastructure (PKI)
Email Encryption
Disk Encryption
Cryptanalysis

  Write a Review

Cyber Security Certification Course

Go to Paid Course