TED/C20
Certified Ethical Hacking and IT Securitylevel II
6 Months, Rs. 19.74K, Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, mitmproxy, Skipfish
To train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities.Enhance their skills making them confident in handling situations like zero-day incidence response, data-theft management, incidental data lost, or an Intrusion by the unauthorized.
We are running this course from 2012. 250+ Students enrolled till now. We have maximum students from South India and African Countries
TED/C20
Number of Lecture (L) hours and Practical (P) hours
750 hours (40 % Theory and 60% lab)
Differentiators
Students are taught by Industry Level Certified Professionals. A virtual environment created for students helps the participant to practice and perform real-time attacks on a virtual simulation network, advanced level penetration testing techniques, privilege escalation techniques that intruders use to penetrate the network.Wireless Communication standards, Wireless Hacking, Exploit Writing skills, Android and iPhone security, Network Security, and other major concepts which are also included in our course to make participants a complete Ethical Hacker.Course taught by industry level certified professionals.
Course Curriculum Outline
Evaluation
Customised online Examination Portal developed by SIFS India Continuous assessment is done via quizzes, assignments and solving of real case studies. Students should score a minimum of 40% in each assessment to pass and be certified.
Reference Materials
Books and Study Portal
Course Learning Outcomes
Students will learn:
- Ethical hacking and its field of hackers.
- Foot-printing and its techniques Perform effective reconnaissance.
- Port, Network and Vulnerability scanning.
- Monitor and intercept network traffic.
- Password cracking of documents and Windows.
- Attack Windows and Linux systems.
- Basics of Trojans and Backdoors.
- Various types of viruses and worms
- Essentials of System hijacking and its various types
- Social Engineering and various factors that lead to
- Algorithms used for Cryptography.
- Basics of hacking a mobile device.
- Basics of Steganography and its useful tools.
Complete curriculum
Pre- requisites
- Basic Understanding of Computer Systems.
- Laptop with good configuration.
- Basics of Computer Languages (C/C++, HTML and Java)
Teaching pedagogies
- Online Learning.
- In-house Training.
- Internship.
Tools Used
Industry Specific all relevant tools (Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, mitmproxy, Skipfish and more)
Placement Potential
As per our data more than 70% People placed and working in the same. We can only assist in Placement
Industry Associates
SIFS India
Resource Persons
Pricing
INR 19,470 (excluding taxes)