partner partner
courses-details

One Year DIPLOMA IN COMPUTER HARDWARE & NETWORKING, Software & Accounting.

Course Details:-

Diploma in Networking, Cyber Security & Ethical Hacking

This Diploma course covers the major issues surrounding the use of penetration testing to secure network security and important skills of a professional hacker and common security challenges that an information security officer will face in his/her work.

Topics include the ethics of ethical hacking, laws and regulations, vulnerability discovery and risk analysis, internal and external attacks, how malicious hackers attack and exploit system vulnerabilities, penetration testing methods and tools, latest security countermeasures, and various types of penetration testing and programming skills required to complete successful penetration tests and to secure real systems against real attacks.

Module 1 : Ethical Hacking Concepts and Pentesting Environment

In this module, you will learn ethical hacking concepts and the legal aspect of ethical hacking; specifically, what you can and cannot do legally. Finally, you will build pentesting environment and review basic Linux commands.

After completing this module, you will be able:

  • Describe the role of an ethical hacker
  • Describe what you can do legally as an ethical hacker
  • Describe what you cannot do as an ethical hacker
  • Run pentesting assignments using Kali and NETinVM virtual machines.

Module 2 : TCP/IP Concepts

In this module, you will review major concepts and aspects of the TCP/IP protocol, including each of the four layers of the protocol stack: Application, Transport, Internet, and Network. You will also review the IP addressing schemes and how they relate to TCP/IP protocol and security. 

After completing this module, you will be able:

  • explain the TCP/IP protocol stack
  • explain the basic concepts of IP addressing
  • use network analyzer
  • read a network capture

Module 3 : Network and Computer Attacks

In this module, you will learn about different types of malicious software. Malicious software, sometimes referred to as malware, includes viruses, Trojan horses, and worms; different types of malware and network attacks and how to protect their resources from them.

After completing this module, you will be able:

  • Describe the different types of malicious software and what damage they can do
  • Describe methods of protecting against malware attacks
  • Describe the types of network attacks
  • Identify different type of attacks and countermeasures

Module 4 : Footprinting and Social Engineering

In this module, you will learn about footprinting, a technique used to find network information. A list of several free web tools that can be used for security testers, or attackers, for footprinting is provided. You will also learn how to gather more information when footprinting a network using DNS. and social engineering. Social engineers target the human resources of a network to find its vulnerabilities or perpetrate an attack.

After completing this module, you will be able:

  • Use Web tools for footprinting
  • Conduct competitive intelligence
  • Describe DNS zone transfers
  • Identify the types of social engineering

Module 5 : Port Scan

In this module, you will learn about different type of port scanning and various tools used for port scanning.

After completing this module, you will be able:

  • Describe different types of port scans
  • Describe various port-scanning tools

Module 6 : Enumeration

In this module, you will learn how to enumerate systems: obtain information about users, passwords, and shared resources.

After completing this module, you will be able:

  • Describe the enumeration step of security testing
  • Enumerate Windows OS targets
  • Enumerate *nix OS targets

Module 7 : Embedded Systems

In this module, you will learn how to identify vulnerabilities in embedded operating systems and how to protect them. The lab covers Linux OS.

After completing this module, you will be able:

  • Explain what embedded operating systems are and where they are used
  • Describe embedded operating systems
  • Identify vulnerabilities of embedded operating systems and best practices for protecting them
  •  Penetrate Linux OS

Module 8 : Vulnerability Disclosure

you will learn why "how to disclose vulnerabilities" has been one of the most widely debated topics in security in a long time.

After completing this module, you will be able:

  • Explain the term full public disclosure
  • Explain the term reasonable disclosure
  • Explain the term window of exposure

Module 9 : Compliance and Regulations

you will learn about laws and policies that dictate companies and organizations how to protect information technology, systems and networks from cyber-attacks.

After completing this module, you will be able:

  • Use a risk management framework
  • Show the concept of identity management and how it is important
  • Be aware of multiple definitions for the word "policy" within a cybersecurity context

Module 10 : Hacking Web

you will learn about Web applications and their vulnerabilities. You will also explore several tools used to attack Web servers.

After completing this module, you will be able:

  • Describe Web applications
  • Explain Web application vulnerabilities
  • Use the tools used to attack Web servers

Module 11 : IoT

you will learn how to protect connected devices and networks in the Internet of things.

After completing this module, you will be able:

  • Demonstrate several security issues and challenges of collaborative data acquisition in IoT
  • Illustrate the challenges in securing different IoT applications
  • Express data security management in sensor networks

Module 12 : Security Devices

you will learn about network protection systems that security professionals and network administrators can use to better protect networks. Topics include intrusion detection systems and intrusion prevention systems and their role in network defense, and the concept of honeypots and how they can be usedto better understand the techniques of hackers.

After completing this module, you will be able:

  • Explain how routers are used as network protection systems
  • Describe firewall technology and tools for configuring firewalls and routers
  • Describe intrusion detection and prevention systems and Web-filtering technology
  • Explain the purpose of honeypots

 


Related Courses

Top Searches

Join Diploma in Networking, Cyber Security & Ethical Hacking, One year Diploma in Mohali Chandigarh, Join Diploma In Networking, computer Diploma in Mohali