Higher Diploma in in Cyber Security & Ethical Hacking

HIGHER DIPLOMA IN CYBER SECURITY & ETHICAL HACKING

This is an advance ethical hacking course with key issues plaguing the information security, information security controls, penetration testing and information security flaws and its counter measures. This course has been prepared with equipping learners with ethical hacking and dark world of unethicals hackers with lots of practical sessions.

  • Very good knowledge in using Linux or other operating systems
  • A good understanding of web development and databases e.g mysql,oracle,postgress
  • Learner having taken the diploma course in ethical hacking or a beginner course
  1. Introduction to ethical hacking – This first module that start with an overview of the current security scenario and emerging threat vectors. It also provide an insight into different element of information security as well as ethical hacking concepts.

 

  1. Foot printing and reconnaissance – Foot printing is the first step in evaluating the security posture of a target organization's IT infrastructure. With this module one is expected to be able to gather maximum information about a computer system or network and about any device connected to that network. Generally, it's to provide security profile blueprint for a target and should be undertaken in methodological manner.

 

 

  1. Scanning of networks – After the above module, this module act as extended part of it in which an attacker tries to search for entry point into the target system or network. This module is meant to allow an attacker learn more about operating systems, services and configuration lapses so that this information help him/her select strategies for the attack on the target system/network
  2. Enumeration – This module involving active info gathering. This module starts with introduction to enumeration concepts and provide and insight into different techniques for NETBIOS,SNMP,LDAP,NTP,SMTP,DNS,IPSEC,voip,RPC and LINUX/UNIX enumeration
  3. Vulnerability analysis – This module involves identifying security loopholes in the target organization network, communication infrastructure and end systems. This identified vulnerability is the use to perform further exploitation on the target network. Vulnerability management life cycle and various approaches and tools to perform assessment is discuss in details.
  4. System hacking and exploitation – system hacking being the ultimate goal of an attacker. This module will focus on awareness and techniques used by the attacker to achieve their goals. Exploitation of various information achieve above is also done. Hacking methodology and penetest is discussed further.
  5. Malware threats – This module is primarily meant to provide the knowledge about various types of malwares, how they work and propagate or spread on the internet, how they are created, their symptoms and consequences. Pentest is also done to enhance security against malware
  6. Sniffing – This is a module with an objective to give an overview of sniffing concepts and techniques provide and insight into MAC,DHCP,ARP,MAC spoofing and DNS poisoning attacks.
  7. Social engineering – This is a module that focuses on fallacies and advocates effective countermeasures, the possible methods of extracting information’s from another human being relying on attacker's ingenuity. This module gives an insight into human-based, computer-based and mobile-based social engineering techniques
  8. Denial of service – DOS and DDOS attacks being major threat to computer network by making machine and network resources unavailable to its authorized users. This module will provide and insight into different techniques used by hackers and possible countermeasures
  9. Session hijacking – This module will be discussing various ways an attacker will take over active session by bypassing the authentication process. Session hijacking concepts and an insight into session hijacking at application and network-levels is discuss
  10. Evading firewall, ids and honey pot – Adoption of internet use through the business world has boosted network usage in general and organization is using various network security measures to protect their networks. Networks being the most preferred target of hackers for compromising company security this module provide a deep insight into various network security technologies; their operations and various techniques attacker evade them.
  11. Hacking webservers – web servers are critical component of a web infrastructure and any single vulnerability in web server configuration may lead to security breach on websites. Thus, this module gives overview of webserver concepts and insight into various web server attacks, attack methodology and attack tools.
  12. Hacking web applications – web application is becoming integral component of online business. This web application is becoming vulnerable to more sophisticated threats and attack vectors. This module is meant to familiarize you with various web application, web attack vectors, and how to protect organization information resources from them.
  13. Sql injection – SQLinjection being the most common and devastating attack that attackers can launch to take control of a websites. This module discusses sql injection attack as well as tools and techniques use by hackers
  14. Hacking wireless networks – Since wireless network are inexpensive and easy to maintain when compared wired networks. An attacker can easily compromise wireless network if proper security measures are not used or if there is no appropriate network configuration. This module therefore describes the type of wireless network, their security mechanism, threats and measures to combat the threats to keep the network secure
  15. Hacking mobile platforms – with advancement of mobile technology, mobility has become the key parameter for internet usage and people believing that surfing the internet on mobile device is safe, many users fail to enable existing security software. Therefore, this module explains potential threats to mobile platforms and provide guideline for using mobile device securely
  16. Iot hacking – IOT has evolved from convergence of wireless technology and it has been applied in different sectors of industries. As IoT is an evolving technology immaturity of technologies and services provided by various vendors will have broad impact on organization leading to complete security issues. All the measures are discussed in this module
  17. Cloud computing – Cloud computing is an emerging technology that delivers computing services over the internet which enable distributed workforce, reducing expenses and providing data security. This module is meant to provide computing concepts, insight into cloud computing threats and cloud computing attacks.
  18. Cryptography – With the increasing adoption of Internet-world wide web for business and personal communication, securing sensitive information such as credit card is becoming increasingly important yet difficult to achieve. This module provides comprehensive understanding of different crypto system and algorithms and different way cryptography will help to ensure privacy and security.

INTAKES

Deadline

18th Feb 2021

Deadline

10th May 2021

Deadline

6th Sept 2021

E-learning Portal