Ethical Hacking+ Program

by CyberForge Academy Claim Listing

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

₹4999

Contact the Institutes

Fill this form

Advertisement

CyberForge Academy Logo

img Duration

6 Weeks

Course Details

Ethical Hacking+ course is offered by CyberForge Academy. Our instructors are experienced, qualified and have experience in developing/deploying/securing SaaS. At CyberForge Academy, we envision a world where everyone has the opportunity to learn and grow with the rapid advancements in technology.

Our vision is to be a catalyst for change, fostering a global community of learners, innovators, and leaders who are prepared to tackle the challenges of tomorrow.

 

Program Syllabus:

  • Module 1: Computer Science Fundamentals
  • Computer Networks Basics
  • How networks actually work?
  • OSI vs TCP/IP model in practice
  • Fundamental Protocols
  • ARP
  • DNS
  • DHCP
  • ICMP
  • Operating System Basics
  • How exactly does the OS work?
  • Kernel vs Userspace
  • Linux vs Windows vs MacOS
  • Writing C program to understand how compilation works
  • Linux Basics
  • Git and Github
  • Basics and Advanced commands
  • Important Services and nuances of Linux
  • Module 2: Cybersecurity Fundamentals
  • Understanding cybersecurity basics
  • Core principles and terminologies
  • Tools of Trade and lab setups
  • Module 3: Cryptography
  • Introduction to Cryptography
  • Cryptographic Hashes
  • Encryption Schemes: Symmetric and Asymmetric (PKC)
  • Digital Signatures
  • Hands-on: Calculating Hash with online and CLI tools
  • Hands-on: Encrypting and decrypting data with AES/RSA
  • Hands-on: Creating and using Digital Signature
  • Module 4: Virtualization
  • Virtual Machine and Virtualization Basics
  • Setting up and managing virtual machines (VirtualBox)
  • Containers and Containerization Basics
  • Docker, Docker Desktop and Docker Compose
  • Building and running Docker images
  • Building home lab
  • Hands-on: Install VirtualBox and create Kali VM
  • Hands-on: Install Docker and run target containers on Kali
  • Module 5: Network Security
  • Fundamentals of network security
  • Basic network security protocols and devices
  • FTP
  • HTTP
  • Telnet
  • Secure alternatives and how to use those
  • Secure FTP
  • HTTPS
  • SSH
  • Traffic Capture and Analysis
  • Introduction to Wireshark, Traffic/Capture Filters and tricks
  • Hands-on: Capture and save traffic with Wireshark
  • Hands-on: Analyze HTTP, DNS, ARP traffic
  • Hands-on: TCP/UDP Stream Reconstruction
  • Hands-on: Export unencrypted files from Traffic
  • Host discovery and Identification
  • Introduction to NMap, Commands and Scripts
  • Hands-on: Network scanning to discover hosts
  • Hands-on: Device/OS Fingerprinting
  • Hands-on: Detection of services and attacking those with scripts
  • Understanding the difference in HTTP and HTTPS
  • Hands-on: Creating a setup with Web Server
  • Hands-on: Creating TLS certificate with OpenSSL and configuring web server on HTTPS
  • Module 6: Security in Host Systems
  • What is a vulnerability?
  • How are systems exploited or hacked?
  • Hands-on: Hacking a vulnerable machine
  • What are Firewalls and AVs?
  • How defensive components work and can be bypassed?
  • Hands-on: Configure Firewall on Windows, Linux and MacOS
  • What is privilege escalation and how is it done?
  • Hands-on: Perform Privilege escalation
  • Module 7: Web and Application Security
  • How Web Applications work and how those are hosted?
  • Basics of web application security
  • Tools and common web vulnerabilities (OWASP Top 10 2021)
  • Broken Access Control
  • Cryptographic Failures
  • Injection
  • Insecure Design
  • Security Misconfiguration
  • Vulnerable and Outdated Components
  • SSRF
  • Hands-on: Web application attack to exploit all common vulnerabilities
  • Secure Coding and Best practices
  • Web Application Firewall
  • Hands-on: Configuring a WAF
  • What is Captcha and Why is it used?
  • Hands-on: Setting up a captcha and breaking it
  • Module 8: WiFi Security
  • WiFi Basics and Traffic Analysis
  • DIfferent security schemes i.e. WEP, WPA/WPA2-PSK
  • Hands-on: Hacking a WiFi network
  • Hands-on: Securing a wireless network
  • Module 9: Cloud Security
  • What exactly is cloud?
  • AWS Basics and usage
  • How to use 5 most popular services of AWS 
  • Common security misconfiguration on AWS
  • Hands-on: Identifying and exploiting misconfiguration on AWS infrastructure
  • Defending AWS Cloud
  • Hands-on: Protecting AWS cloud from hacks
  • Module 10: Path Forward
  • Beginner Cybersecurity Certifications, Jobs and Career Path
  • Identifying your strengths and interest
  • How to imbibe continuous learning
  • Capstone Project
  • Using the acquired knowledge, develop a real-world Cybersecurity project or open source Cybersecurity tool
  • Coding vs non-coding projects
  • Mohali Branch

    412, Tower A, Bestech Business Tower, Mohali

Check out more CEH (Certified Ethical Hacker) courses in India

Govardhan Logo

Ethical Hacking

Ethical Hacking training is offered by Govardhan for all skill level. The framework supporting many languages and developed by leading tech giant Microsoft.

by Govardhan [Claim Listing ]
AIIT Computer Education Logo

Ethical Hacking

Ethical Hacking course is offered by AIIT Computer Education for all skill level.

by AIIT Computer Education [Claim Listing ]
UniNets Logo

Ethical Hacking Course

With CEH course and training at UniNets, you will gain expertise in defending the cyber attacks. Also, finding the loopholes from where systems and networks can be attacked and ways to fix them.

by UniNets [Claim Listing ]
RIMSR Logo

Ethical Hacking

Ethical Hacking course is offered by RIMSR. The courses are highly adaptive and sensitive to the changing training needs of students & professionals. Rangnekar Institute of Management Studies and Research(RIMSR), is a private education trust registered under the Indian Trusts Act, 1832.

by RIMSR [Claim Listing ]
Weltec Institute Logo

Ethical Hacking

If you are willing to take hacking as your career, Weltec has to be your ultimate resort for ethical hacking training in India. In this program, you’ll master the advanced hacking tools and methodologies which will help you boost your network security skills.

by Weltec Institute [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy