• No products in the cart.

  • LOGIN

Course Overview:

This course is designed for the participants having some experience and background related with security. This course will cover from the basic terminologies and concepts to advance level components related with security. The course will help you in understanding the components of ethical hacking and cyber security both theoretically and practically by the experienced trainer from India.

 

Course Learning Goals:

  • Describe the role of computers and networks in a security context
  • Identify computer system threats and evaluate their impact
  • Demonstrate how defence in depth can be used to implement security

 

Course Curriculum:

  • INTRODUCTION TO ETHICAL HACKING AND CYBER SECURITY
    • Information Security Overview
    • Information Security Threats and Attack Vectors
    • Hacking Concepts, Types and Phases
    • Ethical Hacking Concepts and Scope
    • Hacking Vs Cracking
    • Information Security Controls
    • Penetration Testing
    • Information Security Laws and Standards
  • LAB SETUPS AND TOOLS
    • Virtualisation
    • Introduction to Kali Linux
    • Installation of Kali Linux on vm-ware and base machine
    • Installation of Windows on vm-ware
  • NETWORKING
    • IP(ipv4/ipv6)
    • External and Internal ip Address and the Internet
    • MAC
    • LAN ,WAN
    • Wireless Network
    • Packets
    • Ports and 127.0.0.1
    • DNS
  • FOOTPRINTING AND RECONNAISSANCE
    • Footprinting Concepts
    • Footprinting Methodology
    • Footprinting Tools
    • Footprinting Countermeasures
    • Footprinting Penetration Testing
  • SCANNING NETWORKS
    • Overview of Network Scanning
    • Scanning Methodology
  • SYSTEM HACKING
    • Evaluating Information for System Hacking
    • System Hacking Goals
    • Hacking Methodology
    • Back Doors, Trojan Horse
    • Dumpster Diving
    • Hiding Files Covering Tracks
    • Protect Files and Drives
    • Penetration Testing
  • MALWARE THREATS
    • Malware
    • Trojan
    • Virus and Worms
    • Virus Analysis and Detection Methods
    • Malware Analysis
  • SNIFFING
    • Sniffing Concepts
    • MAC Attacks
    • DHCP Attacks
    • ARP Poisoning Spoofing Attack
    • DNS Poisoning
    • Sniffing Tools
    • Sniffing Tool: Wireshark
    • Packet Sniffing Tool: Capsa Network Analyser
    • Network Packet Analyser
    • Countermeasures Sniffing Detection
  • SOCIAL ENGINEERING
    • Social Engineering Concepts
    • Social Engineering Techniques
    • Impersonation on Social Networking Sites
    • Identity Theft
  • DENIAL OF SERVICE
    • DoS/DDos Concepts
    • DoS/DDoS Attack Techniques
    • Botnets
    • DDoS Case Study
    • Dos/DDos Attack Tools Counter-Measures
    • Dos/DDos Protection Tools DoS/DDos Attack Penetration Testing
  • HACKING WEBSERVERS
    • Webserver Concepts
    • Webserver Attacks
    • Attack Methodology
    • Webserver Attack Tools Countermeasures, Security Tool
    • Webserver Security Tools
  • SQL INJECTION
    • SQL Injection Concepts
    • Types of SQL Injection
    • SQL Injection Methodology
    • SQL Injection Tools
    • Evasion Techniques
    • Countermeasures

Course Curriculum

No curriculum found !

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

TAKE THIS COURSE0 SEAT LEFT
  • 10,000.00 2,500.00
  • 10 Days
  • 30 SEATS
30 STUDENTS ENROLLED

Join Our Viber Community

Contact Us

+977-01-5551766 / +9779843636871

contact@glocalafterschool.com

top
© Glocal Pvt. Ltd. All rights reserved.
X