Cyber Security (Ethical Hacking)

by IIT Kanpur (The Indian Institute of Technology) Claim Listing

CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

IIT Kanpur (The Indian Institute of Technology) Logo

img Duration

Please Enquire

Course Details

This course is designed for a student who wants to go in field of Cyber Security or Network Security Analyst. CEH is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors and practical, real time demonstration of latest hacking techniques, methodologies, tools, tricks and security measures.

 

Curriculum:

  • Module 1 – Introduction to Ethical Hacking
    • Introduction to Ethical Hacking
    • What is hacking?
    • Incident management process
    • Penetration testing
    • Information security
  • Module 2 – Foot printing and Reconnaissance
    • What is Foot printing and Reconnaissance?
    • Various types of foot printing
    • Foot printing tools
    • Foot printing countermeasures
  • Module 3 – Scanning Networks
    • Network scanning techniques
    • Scanning countermeasures          
  • Module 4 – Enumeration
    • Enumeration techniques
    • Enumeration countermeasures
  • Module 5 – Vulnerability Analysis
    • Vulnerability Analysis using different tools 
  • Module 6 – System Hacking
    • System hacking methodology
    • Steganography
    • Steganalysis attacks
    • Covering tracks
  • Module 7 – Malware Threats
    • Different types of Trojans
    • Trojan analysis
    • Trojan Countermeasures.
    • Working of viruses.
    • Virus analysis
    • Computer worms
    • Malware analysis
  • Module 8 – Sniffing
    • Packet sniffing techniques
    • How to defend against sniffing
    • Module 9 – Social Engineering
    • Social Engineering techniques
    • Identify theft
    • Social engineering countermeasures
  • Module 10 – Denial-of-Service
    • DoS/DDoS attack techniques
    • Botnets
    • DDoS attack tools
    • And DoS/DDoS countermeasures
       
  • Kanpur Branch

    318 IME Building, Kanpur

Check out more CEH (Certified Ethical Hacker) courses in India

Future Finders Logo

Ethical Hacking

Hacking is the act of breaking into a security system without authorization and damaging the information or organisation. As a result, businesses employ specialists to identify security system weaknesses and strengthen them.

by Future Finders [Claim Listing ]
Ethical Hackerz Logo

Certified Ethical Hacking (CEH)

Certified Ethical Hacking (CEH) course is offered by Ethical HackerZ for advance level. Our classes are taught by Certified and experienced Faculty . Using proven teaching strategies, they make sure that every student finds a path to success.

by Ethical Hackerz [Claim Listing ]
Skillogic Logo

Certified Ethical Hacker Certification Course (CEH)

The inception of the Certified Ethical Hacker in 2003 has helped a great deal in addressing the possible data vulnerabilities. The possibilities of skills and expertise demonstrated by the Certified Certified Ethical Hacking Course profession have made it one of the most sought after jobs.

by Skillogic [Claim Listing ]
H&B Computer Education Logo

Ethical Hacking

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers.

by H&B Computer Education [Claim Listing ]
Cyberoid Logo

Ethical Hacking Course

Ethical hacking is sometimes called penetration testing, which can detect, infiltrate / threaten systems, malicious attackers and exploit data, financial loss or other major damages to systems or networks.

by Cyberoid [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy