PG Certification in Cyber Security and Ethical Hacking by Intellipaat provides exhaustive learning on Cyber Security concepts, including data security, risk analysis and mitigation, ethical hacking and cloud-based security. This postgraduate certification course in hacking will be instrumental for candidates in building up and strengthening their academic foundation to excel in the domain and acquire industry exposure. EC-Council, an American organisation that offers education and training on Cyber Security is a collaborator for this course.
PG Certification in Cyber Security and Ethical Hacking Syllabus is delivered by experts from top companies, allowing learners to practice 100+ essential tools and get real-world experience. They shall work on beginner, intermediate and advanced project work to upskill themselves. As a unique offering, Intellipaat PeerChat can be resorted to for peer learning, alumni interaction and project collaboration.
The Highlights
Online learning format
Offering by E&ICT Academy, MNIT Jaipur in collaboration with the EC-Council
Delivered by MNIT faculty
7 months classes held
24 hacking challenges from EC Council
Certified Ethical Hacker certificate from EC Council
PG Certification in Cyber Security and Ethical Hacking Fee details are mentioned below-
The course is priced at Rs. 85,044 + GST
No-cost EMI at Rs. 4999 + GST is also available
PG Certification in Cyber Security and Ethical Hacking Fee Structure
Fee
Amount in Rupees
Programme Fee
Rs. 85,044
Total
Rs. 85,044 + GST
Eligibility Criteria
Education
Learners of PG Certification in Cyber Security and Ethical Hacking Online Course should have a bachelor’s degree with 50% marks or more.
Certification qualifying details
Learners who complete the assignments, projects and pass Intellipaat’s quiz with a score of 60% or more in the qualifying examination will be able to access PG Certification in Cyber Security and Ethical Hacking.
What you will learn
Knowledge of LinuxKnowledge of CryptographyRisk ManagementKnowledge of cloud computing
PG Certification in Cyber Security and Ethical Hacking Online Course opens avenues to new learning opportunities for candidates by providing knowledge of the following-
Learners shall get an understanding of all the fundamentals of Linux
Concepts of Ethical Hacking have been dealt with in this course
The modules aptly deal with the phases of a social engineering attack
Candidates will learn more about Distributed reflection Denial-of-Service (DRDoS) and surrounding concepts
They will be taught how to defend against firewall evasion
The course helps candidates discover patches and patch management
They will be introduced to the types of signature evasion techniques
Besides this, topics like GPS mapping and WiFi discovery have also been covered.
Who it is for
PG Certification in Cyber Security and Ethical Hacking Training has been crafted for the following candidates-
Freshers and professionals with non-programming backgrounds seeking experience in the cybersecurity paradigm
Professionals seeking a career upgrade as a cybersecurity expert
Professionals who want to transition their career to ethical hacking
Any IT professional with a Bachelor’s degree-seeking experience in cybersecurity
Anyone with a Bachelor’s degree passionate about cybersecurity technologies
Admission Details
The following steps include the application process for PG Certification in Cyber Security and Ethical Hacking Programme-
Step 1: Select “Apply Now” on https://intellipaat.com/pg-certification-cyber-security-ethical-hacking-mnit/ and fill in your name, email and upskilling objective.
Step 2: Your query will now be submitted, and a counsellor will get in touch with you.
Step 3: The admission panel will shortlist candidates considering their applications.
Step 4: If you are selected, you will receive an intimation within a week, after which you can block your seat.
Application Details
Candidates are supposed to enter their full name, phone number, upskilling objective and email ID for further correspondence.
The Syllabus
Linux
Introduction to Linux – Establishing the fundamental knowledge of how linux works and how you can begin with Linux OS.
Linux Basics – File Handling, data extraction, etc.
Hands-on Sessions And Assignments for Practice – Strategically curated problem statements for you to start with Linux.
Introduction to Ethical Hacking
Information Security Threats and Attack Vectors
Motives, goals, and objectives of information security attacks
Top information security attack vectors
Information security threat categories
Types of attacks on a system
Information warfare
Hacking Concepts
What is hacking?
Who is a hacker?
Hacker classes
Hacking phases
Ethical Hacking Concepts
What is Ethical Hacking?
Why is Ethical Hacking necessary?
Scope and limitations of Ethical Hacking
Skills of an Ethical Hacker
Information Security Controls
Information Assurance (IA)
Information security management program
Enterprise Information Security Architecture (EISA)
Network security zoning
Defense-in-Depth
Information security policies
Physical security
What is risk?
Threat modeling
Incident management
Security Incident and Event Management (SIEM)
User Behavior Analytics (UBA)
Network security controls
Identity and Access Management (IAM)
Data leakage, backup, and recovery
The role of AI/ML in Cyber Security
Penetration Testing Concepts
Why penetration testing?
Security audit
Vulnerability assessment
Blue Teaming/Red Teaming
Types and phases of penetration testing
Security testing methodology
Information Security Laws and Standards
Payment Card Industry Data Security Standard (PCI-DSS)
ISO/IEC 27001:2013
Health Insurance Portability and Accountability Act (HIPAA)
Sarbanes Oxley Act (SOX)
The Digital Millennium Copyright Act (DMCA)
Federal Information Security Management Act (FISMA)
Cyber law in different countries
Footprinting and Reconnaissance
Footprinting through Search Engines
Footprinting through search engines
Footprint using advanced Google hacking techniques
Information gathering using Google Advanced Search and Image Search
Google Hacking Database
VoIP and VPN footprinting through Google Hacking Database
Footprinting through Web Services
Finding the company’s Top-level Domains (TLDs) and sub-domains
Finding the geographical location of the target
People Search on social networking sites and people search services
Gathering information from LinkedIn
Gather information from financial services
Footprinting through job sites
Monitoring target using alerts
Information gathering using groups, forums, and blogs
Determining the OS
VoIP and VPN footprinting through SHODAN
Footprinting through Social Networking Sites
Collecting information through social engineering on social networking sites
Website Footprinting
Website Footprinting
Mirroring the entire website
Extracting website information
Monitoring web pages for updates and changes
Email Footprinting
Tracking email communications
Collecting information from the email header
Email tracking tools
Competitive Intelligence
Whois Footprinting
Whois Lookup
Whois Lookup result analysis
Whois Lookup tools
Finding IP geolocation information
DNS Footprinting
Extracting DNS information
DNS interrogation tools
Network Footprinting
Locate the network range
Traceroute
Traceroute analysis and tools
Footprinting Through Social Engineering
Footprinting through social engineering
Eavesdropping
Shoulder surfing
Dumpster diving
Footprinting Tools
Maltego
Recon-ng
FOCA
Recon-Dog
OSRFramework
Additional footprinting tools
Footprinting Countermeasures
Footprinting Pen Testing
Scanning Networks
Introduction to Network Scanning
Scanning tools: Nmap, Hping2 / Hping3, and Hping commands