Certified Cyber Security Associate

Duration | 30 hours

Cyber Security Specialist is responsible for providing security during the development stages of software systems, networks and data centers. The professionals have to search for vulnerabilities and risks in hardware and software. They manage and monitor any attacks and intrusions.

Prerequisites

Prospective students need to have obtained a high school diploma, taken the prerequisite math and science courses (the exact prerequisites will depend on the individual program) and be proficient in English.

Course Objectives

The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.

Things you will learn

We help our students at every stage, from the start of a course to the actual skill-building technique. Our curriculum covers the following.

Ethical Hacking Overview

  • Types of Hacking
  • Advantages of Hacking
  • Disadvantages of Hacking
  • Purpose of Hacking

Hacker Types & Features

  • White Hat Hackers
  • Black Hat Hackers
  • Grey Hat Hackers
  • Miscellaneous Hackers
  • Famous Hackers
  • Terminologies
  • Tools
  • Skills
  • Basic Skills
  • Courses & Certifications
  • Process
  • Ethical Hacking
  • Reconnaissance

Footprinting

  • Domain Name Information
  • Finding IP Address
  • Finding Hosting Company
  • IP Address Ranges
  • History of the Website

Fingerprinting

  • Basic Steps
  • Port Scanning
  • Ping Sweep
  • DNS Enumeration

Sniffing

  • Types of Sniffing
  • Hardware Protocol Analyzers
  • Lawful Interception

ARP Poisoning

  • What is ARP Spoofing?
  • What is MITM?
  • ARP Poisoning − Exercise

DNS Poisoning

  • DNS Poisoning − Exercise
  • Defenses against DNS Poisoning
  • Ethical Hacking
  • Exploitation
  • Enumeration
  • Metasploit
  • Exploits of Metasploit
  • Metasploit Payloads
  • Trojan Attacks
  • TCP/IP Hijacking
  • Email Hijacking
  • Email Spoofing
  • Social Engineering
  • Inserting Viruses in a User System

Password Hacking

  • Dictionary Attack
  • Hybrid Dictionary Attack
  • Brute-Force Attack
  • Rainbow Tables

Wireless Hacking

  • Kismet
  • NetStumbler
  • Wired Equivalent Privacy
  • Wireless DoS Attacks
  • Social Engineering

Ethical Hacking | DDOS Attacks

  • What are Botnets?
  • Types of DDoS Attacks
  • Cross-site Scripting
  • SQL Injection
  • Pen Testing

Ab Job Pakki!!
Kickstart your career