Cyber Security & Ethical Hacking
This comprehensive program combines the essential knowledge of computer hardware components and networking with advanced skills in ethical hacking. Participants will develop a strong foundation in assembling and disassembling computer systems, configuring network settings, and troubleshooting common issues. Additionally, they will get into the world of ethical hacking, gaining the expertise to identify vulnerabilities and weaknesses in target systems.
Duration: 4 Months / 144 Hours
Career Path
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defence Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Information Security Analyst 1
- Security Analyst L1
Course Plan
- History of Computer, CPU, Removable media, Hard Drives
- RAM, Motherboard, Power supply and SMPS
- Adapter cards and Peripherals, BIOS and CMOS
- Ports and Connectors, Portable Computers/Laptop
- Maintenance and Safety precautions,
- Operating Systems
- Introduction to Networking, Networking Equipment's
- Types of Cable, Cable Crimping, Networking in Windows and Linux
- LAN Troubleshooting, WAN Troubleshooting
- Wireless Networks and Security
CYBER SECURITY FUNDAMENTALS
- Definition and importance of Cyber Security
- Evolution of Cyber Security and the current threat landscape
LEGAL AND ETHICAL CONSIDERATIONS
- Overview of Cyber Security laws and regulations
- Ethical considerations in Cyber Security practices
Footprinting and Reconnaissance, Enumeration, Vulnerability Analysis, System Hacking, Malware Threats, Sniffing, Social Engineering, Denial-of-service, Session Hijacking, Evading Ids, Firewalls, and Honeypots, Hacking Web Servers, Hacking Web Applications, Sql Injection, Hacking Wireless Networks, Hacking Mobile Platforms, IOT & OT Hacking, Cloud Computing, Cryptography.