Cyber Security (Ethical Hacking)

by IIT Kanpur (The Indian Institute of Technology) Claim Listing

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIT Kanpur (The Indian Institute of Technology) Logo

img Duration

Please Enquire

Course Details

This course is designed for a student who wants to go in field of Cyber Security or Network Security Analyst. CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

 

Curriculum:

  • Module 1 – Introduction to Ethical Hacking
    • Introduction to Ethical Hacking
    • What is hacking?
    • Incident management process
    • Penetration testing
    • Information security
  • Module 2 – Foot printing and Reconnaissance
    • What is Foot printing and Reconnaissance?
    • Various types of foot printing
    • Foot printing tools
    • Foot printing countermeasures
  • Module 3 – Scanning Networks
    • Network scanning techniques
    • Scanning countermeasures          
  • Module 4 – Enumeration
    • Enumeration techniques
    • Enumeration countermeasures
  • Module 5 – Vulnerability Analysis
    • Vulnerability Analysis using different tools 
  • Module 6 – System Hacking
    • System hacking methodology
    • Steganography
    • Steganalysis attacks
    • Covering tracks
  • Module 7 – Malware Threats
    • Different types of Trojans
    • Trojan analysis
    • Trojan Countermeasures.
    • Working of viruses.
    • Virus analysis
    • Computer worms
    • Malware analysis
  • Module 8 – Sniffing
    • Packet sniffing techniques
    • How to defend against sniffing
    • Module 9 – Social Engineering
    • Social Engineering techniques
    • Identify theft
    • Social engineering countermeasures
  • Module 10 – Denial-of-Service
    • DoS/DDoS attack techniques
    • Botnets
    • DDoS attack tools
    • And DoS/DDoS countermeasures
       
  • Kanpur Branch

    318 IME Building, Kanpur

Check out more CEH (Certified Ethical Hacker) courses in India

Seldom India Technologies Logo

Cyber Security & Ethical Hacking Training

In this Cyber Security & Ethical Hacking Training by Seldom India you will learn the concepts of Cyber Security, and how to use ethical hacking to check the threat level to the cyber world

by Seldom India Technologies [Claim Listing ]
Shree Academy Logo

Ethical Hacking Training

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

by Shree Academy [Claim Listing ]
EyeQ Dot Net Pvt. Ltd. Logo

Certified Ethical Hacking Course

Learn from the Real Hackers, and be a Trained Experienced Ethical Hacking Professional in just one Month! Unlock profitable career prospects with Certification in Ethical Hacking, Opening Doors to High-Paying Opportunities.

by EyeQ Dot Net Pvt. Ltd. [Claim Listing ]
  • Price
  • Start Date
  • Duration
Tai Infotech Logo

Certified Ethical Hacking

This class will immerse the candidates into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

by Tai Infotech [Claim Listing ]
AIDM Logo

Basic Certification In Ethical Hacking And Cyber Security

We, AIDM, the best Digital training  Institute in Kolkata is now bringing ethical hacking certification in Kolkata. Ethical Hacking and Cyber Security are no longer matters of luxury, but they are now absolute necessity for any major company. Recent Cyber attacks from May on International ...

by AIDM [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy