Certified Cyber Security Associate
Duration | 30 hours
Cyber Security Specialist is responsible for providing security during the development stages of software systems, networks and data centers. The professionals have to search for vulnerabilities and risks in hardware and software. They manage and monitor any attacks and intrusions.
Prerequisites
Prospective students need to have obtained a high school diploma, taken the prerequisite math and science courses (the exact prerequisites will depend on the individual program) and be proficient in English.
Course Objectives
The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.
Things you will learn
We help our students at every stage, from the start of a course to the actual skill-building technique. Our curriculum covers the following.
Ethical Hacking Overview
- Types of Hacking
- Advantages of Hacking
- Disadvantages of Hacking
- Purpose of Hacking
Hacker Types & Features
- White Hat Hackers
- Black Hat Hackers
- Grey Hat Hackers
- Miscellaneous Hackers
- Famous Hackers
- Terminologies
- Tools
- Skills
- Basic Skills
- Courses & Certifications
- Process
- Ethical Hacking
- Reconnaissance
Footprinting
- Domain Name Information
- Finding IP Address
- Finding Hosting Company
- IP Address Ranges
- History of the Website
Fingerprinting
- Basic Steps
- Port Scanning
- Ping Sweep
- DNS Enumeration
Sniffing
- Types of Sniffing
- Hardware Protocol Analyzers
- Lawful Interception
ARP Poisoning
- What is ARP Spoofing?
- What is MITM?
- ARP Poisoning − Exercise
DNS Poisoning
- DNS Poisoning − Exercise
- Defenses against DNS Poisoning
- Ethical Hacking
- Exploitation
- Enumeration
- Metasploit
- Exploits of Metasploit
- Metasploit Payloads
- Trojan Attacks
- TCP/IP Hijacking
- Email Hijacking
- Email Spoofing
- Social Engineering
- Inserting Viruses in a User System
Password Hacking
- Dictionary Attack
- Hybrid Dictionary Attack
- Brute-Force Attack
- Rainbow Tables
Wireless Hacking
- Kismet
- NetStumbler
- Wired Equivalent Privacy
- Wireless DoS Attacks
- Social Engineering
Ethical Hacking | DDOS Attacks
- What are Botnets?
- Types of DDoS Attacks
- Cross-site Scripting
- SQL Injection
- Pen Testing