Cyber Security

OEM Name: EC- Council

Technologies: Cyber Security

  • Beginner

    Course level
  • 45-60 Days

    Duration
  • ₹ 10000

    Course fee Excluding GST
  • Lump Sum

    Fee payment
  • Senior Secondary Passed

    Min. qualification
  • N/a

    Min. academic %
  • 18 yrs

    Min. age
  • Provided

    Placement assistance
Course
Course
Description & features

This course has been specially designed and curated to introduce latest hacking techniques, gather insights on advanced hacking tools used by malicious hackers, to enable Ethical Hackers protect the digital assets. The course offers insights, tips, and techniques to protect systems from unsolicited attacks on a real-time basis.

Key Features

•        Penetration testing processes.
•        Social engineering.
•        Topology discovery.
•        OS fingerprinting, Configuring Firewalls.
•        Intrusion detection and prevention.
•        Log review and SIEM, SIEM data outputs, SIEM data analysis.
•        Managing Vulnerabilities.
•        Vulnerability Scanners.
•        SCAP, Configuring Vulnerability Scans.
•        Software security testing.
•        Interception proxies.
•        Incident response. Incident response processes.
•        Forensics tools.
•        Digital forensics kits, Image acquisition, Password cracking, Analysis utilities,
Incident analysis and recovery.
•        Analysis and recovery frameworks.
•        Secure network design.

Curriculum

•    Introduction to Cyber Security.
•    Penetration testing processes.
•    Open-source intelligence, social engineering.
•    Topology discovery.
•    OS fingerprinting, Configuring Firewalls.
•    Intrusion detection and prevention, Malware threats, Configuring anti-virus software.
•    Enhanced mitigation experience toolkit, Logging and analysis, Packet capture, Packet capture tools.
•    Log review and SIEM, SIEM data outputs, SIEM data analysis, Point-in-time data Analysis.
•    Managing Vulnerabilities, Vulnerability management requirements, Asset inventory, Data classification.
•    Vulnerability Scanners.
•    SCAP, Configuring Vulnerability Scans, Vulnerability scanning criteria, Exploit. Frameworks.
•    Remediating Vulnerabilities, Analysing Vulnerability scans, Remediation, and change Control.
•    Software security testing.
•    Interception proxies. Web application firewalls, Source authenticity. Reverse Engineering.
•    Incident response. Incident response processes.
•    Forensics tools, Digital forensics crime scenes.
•    Digital forensics kits, Image acquisition, Password cracking, Analysis utilities, Incident analysis and recovery.
•    Analysis and recovery frameworks, analysing network symptoms, Analysing host symptoms, Analysing Data Exfiltration, Analysing application symptoms.
•    Using Sysinternals, Containment techniques, Eradication techniques, Validation techniques, Corrective actions.
•    Secure network design, Network segmentation, Blackholes, Sinkholes, and Honeypots, System hardening.
•    Project on windows password cracking and check footprints.

Course
Documents
pdf Icon
Course Info Brochure / Flyer

More info on the course for the purpose of candidate information

scroll up Button