Advanced Cyber Security Certification Training

BY
Simpliv Learning

Mode

Online

Duration

24 Hours

Fees

$ 299 499

Quick Facts

particular details
Medium of instructions English
Mode of learning Virtual Classroom
Mode of Delivery Video and Text Based

Course and certificate fees

Fees information
$ 299  $499
certificate availability

Yes

certificate providing authority

Simpliv Learning

The syllabus

Basic concepts in programming and networking

  • Introduction to Ethical Hacking  
  • Basic Concepts of Networking (part-l)  
  • Basic Concepts of Networking (part-l I)  
  • TCP/IP Protocol Stack (part-l)  
  • TCP/IP Protocol Stack (Part-lI)  
  • IP addressing and routing (Part I)  
  • IP addressing and routing (Part II)  
  • TCP and UDP (Part I)  
  • TCP and UDP (Part II)  
  • IP subnetting  
  • Routing protocols (Part I)  
  • Routing protocols (Part II)  
  • Routing protocols (Part III)  
  • IP version 6  
  • Routing examples  

Creating lab for System Security

  • Demonstration Part I  
  • Demonstration Part II  
  • Demonstration Part III  
  • Nessus Installation  
  • How to use nessus  
  • Metasploit Exploiting System Software -1  
  • Metasploit Exploiting System Software - II  
  • Metasploit Exploiting System Software and Privilege  
  • Metasploit Social Eng Attack  
  • MITM (Man in The middle)Attack  
  • Basic concepts of cryptography  
  • Private-key cryptography (Part I)  
  • Private-key cryptography (Part II)  
  • Public-key cryptography (Part I)  
  • Public-key cryptography (Part II)  

Different types of Attacks

  • Cryptographic hash functions (Part I)  
  • Cryptographic hash functions (Part II)
  • Digital signature and certificate
  • Applications (Part I)
  • Applications (Part II)
  • Steganography  
  • Biometrics  
  • Network Based Attacks (Part I)  
  • Network Based Attacks (Part II)  
  • DNS and Email Security  
  • Password cracking  
  • Phishing attack  
  • Malware  

Different types of Attacks - II

  • Wifi hacking  
  • Dos and DDos attack  
  • Elements of Hardware Security  
  • Side Channel Attacks (Part I)  
  • Side Channel Attacks (Part II)  
  • Physical Unclonable Function  
  • Hardware Trojan  
  • Web Application Vulnerability Scanning  
  • Part 1 : SQL Injection Authentication Bypass  
  • Part 2: SQL Injection Error Based  
  • Part 3 : SQL Injection Error Based from Web Application  
  • SQLMAP  
  • Cross Site Scripting  
  • File Upload Vulnerability  
  • The NMAP Tool: A Relook (Part I)  
  • The NMAP Tool: A Relook (Part II)  
  • The NMAP Tool: A Relook (Part III)  
  • Network Analysis using Wireshark  
  • Summarization of the Course  
  • Doubt Session  

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books