Cyber Security (Ethical Hacking)

by IIT Kanpur (The Indian Institute of Technology) Claim Listing

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIT Kanpur (The Indian Institute of Technology) Logo

img Duration

Please Enquire

Course Details

This course is designed for a student who wants to go in field of Cyber Security or Network Security Analyst. CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

 

Curriculum:

  • Module 1 – Introduction to Ethical Hacking
    • Introduction to Ethical Hacking
    • What is hacking?
    • Incident management process
    • Penetration testing
    • Information security
  • Module 2 – Foot printing and Reconnaissance
    • What is Foot printing and Reconnaissance?
    • Various types of foot printing
    • Foot printing tools
    • Foot printing countermeasures
  • Module 3 – Scanning Networks
    • Network scanning techniques
    • Scanning countermeasures          
  • Module 4 – Enumeration
    • Enumeration techniques
    • Enumeration countermeasures
  • Module 5 – Vulnerability Analysis
    • Vulnerability Analysis using different tools 
  • Module 6 – System Hacking
    • System hacking methodology
    • Steganography
    • Steganalysis attacks
    • Covering tracks
  • Module 7 – Malware Threats
    • Different types of Trojans
    • Trojan analysis
    • Trojan Countermeasures.
    • Working of viruses.
    • Virus analysis
    • Computer worms
    • Malware analysis
  • Module 8 – Sniffing
    • Packet sniffing techniques
    • How to defend against sniffing
    • Module 9 – Social Engineering
    • Social Engineering techniques
    • Identify theft
    • Social engineering countermeasures
  • Module 10 – Denial-of-Service
    • DoS/DDoS attack techniques
    • Botnets
    • DDoS attack tools
    • And DoS/DDoS countermeasures
       
  • Kanpur Branch

    318 IME Building, Kanpur

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy