Ethical Hacking+ Program

by CyberForge Academy Claim Listing

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

₹4999

Contact the Institutes

Fill this form

Advertisement

CyberForge Academy Logo

img Duration

6 Weeks

Course Details

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

Our vision is to be a catalyst for change, fostering a global community of learners, innovators, and leaders who are prepared to tackle the challenges of tomorrow.

 

Program Syllabus:

  • Module 1: Computer Science Fundamentals
  • Computer Networks Basics
  • How networks actually work?
  • OSI vs TCP/IP model in practice
  • Fundamental Protocols
  • ARP
  • DNS
  • DHCP
  • ICMP
  • Operating System Basics
  • How exactly does the OS work?
  • Kernel vs Userspace
  • Linux vs Windows vs MacOS
  • Writing C program to understand how compilation works
  • Linux Basics
  • Git and Github
  • Basics and Advanced commands
  • Important Services and nuances of Linux
  • Module 2: Cybersecurity Fundamentals
  • Understanding cybersecurity basics
  • Core principles and terminologies
  • Tools of Trade and lab setups
  • Module 3: Cryptography
  • Introduction to Cryptography
  • Cryptographic Hashes
  • Encryption Schemes: Symmetric and Asymmetric (PKC)
  • Digital Signatures
  • Hands-on: Calculating Hash with online and CLI tools
  • Hands-on: Encrypting and decrypting data with AES/RSA
  • Hands-on: Creating and using Digital Signature
  • Module 4: Virtualization
  • Virtual Machine and Virtualization Basics
  • Setting up and managing virtual machines (VirtualBox)
  • Containers and Containerization Basics
  • Docker, Docker Desktop and Docker Compose
  • Building and running Docker images
  • Building home lab
  • Hands-on: Install VirtualBox and create Kali VM
  • Hands-on: Install Docker and run target containers on Kali
  • Module 5: Network Security
  • Fundamentals of network security
  • Basic network security protocols and devices
  • FTP
  • HTTP
  • Telnet
  • Secure alternatives and how to use those
  • Secure FTP
  • HTTPS
  • SSH
  • Traffic Capture and Analysis
  • Introduction to Wireshark, Traffic/Capture Filters and tricks
  • Hands-on: Capture and save traffic with Wireshark
  • Hands-on: Analyze HTTP, DNS, ARP traffic
  • Hands-on: TCP/UDP Stream Reconstruction
  • Hands-on: Export unencrypted files from Traffic
  • Host discovery and Identification
  • Introduction to NMap, Commands and Scripts
  • Hands-on: Network scanning to discover hosts
  • Hands-on: Device/OS Fingerprinting
  • Hands-on: Detection of services and attacking those with scripts
  • Understanding the difference in HTTP and HTTPS
  • Hands-on: Creating a setup with Web Server
  • Hands-on: Creating TLS certificate with OpenSSL and configuring web server on HTTPS
  • Module 6: Security in Host Systems
  • What is a vulnerability?
  • How are systems exploited or hacked?
  • Hands-on: Hacking a vulnerable machine
  • What are Firewalls and AVs?
  • How defensive components work and can be bypassed?
  • Hands-on: Configure Firewall on Windows, Linux and MacOS
  • What is privilege escalation and how is it done?
  • Hands-on: Perform Privilege escalation
  • Module 7: Web and Application Security
  • How Web Applications work and how those are hosted?
  • Basics of web application security
  • Tools and common web vulnerabilities (OWASP Top 10 2021)
  • Broken Access Control
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • SSRF
  • Hands-on: Web application attack to exploit all common vulnerabilities
  • Secure Coding and Best practices
  • Web Application Firewall
  • Hands-on: Configuring a WAF
  • What is Captcha and Why is it used?
  • Hands-on: Setting up a captcha and breaking it
  • Module 8: WiFi Security
  • WiFi Basics and Traffic Analysis
  • DIfferent security schemes i.e. WEP, WPA/WPA2-PSK
  • Hands-on: Hacking a WiFi network
  • Hands-on: Securing a wireless network
  • Module 9: Cloud Security
  • What exactly is cloud?
  • AWS Basics and usage
  • How to use 5 most popular services of AWS 
  • Common security misconfiguration on AWS
  • Hands-on: Identifying and exploiting misconfiguration on AWS infrastructure
  • Defending AWS Cloud
  • Hands-on: Protecting AWS cloud from hacks
  • Module 10: Path Forward
  • Beginner Cybersecurity Certifications, Jobs and Career Path
  • Identifying your strengths and interest
  • How to imbibe continuous learning
  • Capstone Project
  • Using the acquired knowledge, develop a real-world Cybersecurity project or open source Cybersecurity tool
  • Coding vs non-coding projects
  • Mohali Branch

    412, Tower A, Bestech Business Tower, Mohali

Check out more CEH (Certified Ethical Hacker) courses in India

TetraLearn Logo

Ethical Hacking

Ethical Hacking course is offered by TetraLearn. Students who have completed their training courses at Tetralearn are well suited to join any organization & start working on projects immediately with less or no assistance which includes basic technology training from any IT organization.

by TetraLearn [Claim Listing ]
  • Price
  • Start Date
  • Duration
Samyak Classes Logo

Certified Ethical Hacking Training Course

Data Security is getting to be basic day by day. With appearance of more brilliantly innovations are instruments, number and sorts of dangers are expanding at uncommon pace. The troublesome innovations like cloud, Web of Things(IoT) are making more entryways for programmers and challenges are mount...

by Samyak Classes [Claim Listing ]
Samavedha IT Solutions Logo

Ethical Hacking

Ethical Hacking course is offered by Samavedha IT Solutions. Our IT training is totally job-oriented and is inclusive of platforms that have a wider scope in the prevailing and forthcoming IT jobs market.

by Samavedha IT Solutions [Claim Listing ]
Genius Computer Logo

Ethical Hacking

In the computer security context, a security hacker is someone who seeks and exploits weaknesses in a computer system or computer network.

by Genius Computer [Claim Listing ]
Skill Tech Lab Logo

CEH (Certified Ethical Hacking)

Certified Ethical Hacking (CEH) course enhances skills on Infor Security domain of a professional who wants grow as security professional. Our CEH certification training will help you to learn how to protect malicious hacker and data breaches.

by Skill Tech Lab [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy