Cyber Security (Ethical Hacking)

by IIT Kanpur (The Indian Institute of Technology) Claim Listing

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIT Kanpur (The Indian Institute of Technology) Logo

img Duration

Please Enquire

Course Details

This course is designed for a student who wants to go in field of Cyber Security or Network Security Analyst. CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

 

Curriculum:

  • Module 1 – Introduction to Ethical Hacking
    • Introduction to Ethical Hacking
    • What is hacking?
    • Incident management process
    • Penetration testing
    • Information security
  • Module 2 – Foot printing and Reconnaissance
    • What is Foot printing and Reconnaissance?
    • Various types of foot printing
    • Foot printing tools
    • Foot printing countermeasures
  • Module 3 – Scanning Networks
    • Network scanning techniques
    • Scanning countermeasures          
  • Module 4 – Enumeration
    • Enumeration techniques
    • Enumeration countermeasures
  • Module 5 – Vulnerability Analysis
    • Vulnerability Analysis using different tools 
  • Module 6 – System Hacking
    • System hacking methodology
    • Steganography
    • Steganalysis attacks
    • Covering tracks
  • Module 7 – Malware Threats
    • Different types of Trojans
    • Trojan analysis
    • Trojan Countermeasures.
    • Working of viruses.
    • Virus analysis
    • Computer worms
    • Malware analysis
  • Module 8 – Sniffing
    • Packet sniffing techniques
    • How to defend against sniffing
    • Module 9 – Social Engineering
    • Social Engineering techniques
    • Identify theft
    • Social engineering countermeasures
  • Module 10 – Denial-of-Service
    • DoS/DDoS attack techniques
    • Botnets
    • DDoS attack tools
    • And DoS/DDoS countermeasures
       
  • Kanpur Branch

    318 IME Building, Kanpur

Check out more CEH (Certified Ethical Hacker) courses in India

Future Finders Logo

Ethical Hacking

Hacking is the act of breaking into a security system without authorization and damaging the information or organisation. As a result, businesses employ specialists to identify security system weaknesses and strengthen them.

by Future Finders [Claim Listing ]
VIIT (Vedang Inovatiove IT Transformation) Logo

Certified Professional Ethical Hacker

To protect an information system you need to be able to see that system through the eyes of the attacker. The Certified Professional Ethical Hacker certification course is the foundational training to Mile2’s line of penetration testing courses because it teaches you to think like a hacker.

by VIIT (Vedang Inovatiove IT Transformation) [Claim Listing ]
Vidya Training And Development Center Logo

Ethical Hacking

Ethical Hacking course is offered by Vidya Training And Development Center. Our training partnerships allow us to leverage direct access to official and continually updated training materials, lab facilities and periodic faculty development programs.

by Vidya Training And Development Center [Claim Listing ]
Moor Technologies Logo

Ethical Hacking

Ethical Hacking course is offered by Moor Technologies. MOOR Technologies Computer Education has stood as the beacon of tech education in Trichy. Our unwavering commitment to quality education, a team of skilled instructors, a diverse range of offered classes.

by Moor Technologies [Claim Listing ]
  • Price
  • Start Date
  • Duration
AIIT Computer Education Logo

Ethical Hacking

Ethical Hacking course is offered by AIIT Computer Education for all skill level.

by AIIT Computer Education [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy