TED/C21

Certified Ethical Hacking and IT SecurityLevel III

12 Months, Rs. 25.96K, Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, mitmproxy, Skipfish

To train the student into an interactive environment where the student will learn the skills of performing vulnerability assessment, pen-testing of systems and networks, patching the weaknesses, making reports of scanned vulnerabilities.Enhance their skills making them confident in handling situations like zero-day incidence response, data-theft management, incidental data lost, or an Intrusion by the unauthorized.

We are running this course from 2012. 250+ Students enrolled till now. We have maximum students from South India and African Countries

    PG Diploma


    Online/Offline


    12 Months

    TED/C21


Number of Lecture (L) hours and Practical (P) hours

1500 (40 % Theory and 60% lab)

Differentiators

Students are taught by Industry Level Certified Professionals. A virtual environment created for students helps the participant to practice and perform real-time attacks on a virtual simulation network, advanced level penetration testing techniques, privilege escalation techniques that intruders use to penetrate the network.Wireless Communication standards, Wireless Hacking, Exploit Writing skills, Android and iPhone security, Network Security, and other major concepts which are also included in our course to make participants a complete  Ethical Hacker.Course taught by industry level certified professionals.

Course Curriculum Outline

 

  1. Module 1 – Ethical hacking
  2. Module 2 – Footprinting and reconnaissance
  3. Module 3 – Scanning network
  4. Module 4 – Enumeration
  5. Module 5 – System hacking
  6. Module 6 – Trojans and backdoors
  7. Module 7 – Viruses and worms
  8. Module 8 – Sniffing
  9. Module 9 – Session hijacking
  10. Module 10 – Social engineering
  11. Module 11 – Denial of service (dos)
  12. Module 12 – Hacking webserver
  13. Module 13 – Structured query language injection
  14. Module 14 – Hacking wireless networks
  15. Module 15 – Evading ids, firewalls and honeypot
  16. Module 16 – Buffer overflow
  17. Module 17 – Cryptography
  18. Module 18 – Penetration testing
  19. Module 19 – Mobile hacking
  20. Module 20 – Steganography

 

 

Course Curriculum Outline

 Details - 1

Evaluation

Customised online Examination Portal developed by SIFS India Continuous assessment is done via quizzes, assignments and solving of case studies. Students should score a minimum 40% in each assessment to pass and be certified.

Reference Materials

Books and Study Portal

Course Learning Outcomes

 

Students will learn:
  1. Ethical hacking and its field of hackers.
  2. Foot-printing and its techniques.
  3. Perform effective reconnaissance.
  4. Port, Network and Vulnerability scanning.
  5. Monitor and intercept network traffic.
  6. Fundamentals of enumeration.
  7. Password cracking of documents and Windows.
  8. Attack Windows and Linux systems.
  9. Analysis of malware.
  10. Penetration testing and vulnerability assessment.
  11. Troubleshoot networks using Wireshark.
  12. Set up a VPN server.
  13. Hack wireless networks.
  14. Clone websites.
  15. Learn how to deploy a keylogger from a USB.

 

 

Complete curriculum

 Details - 1

Pre- requisites

 

  1. Basic IT knowledge.
  2. Laptop with good configuration.
  3. Basic knowledge of Computer Languages (C/C++, Java, HTML, Python, and SQL).
  4. USB drive to install Linux.
  5. Wireless card & router access.
  6. Various programs used to demo attacks (FREE).

 

 

Teaching pedagogies

 

  1. Online Learning.
  2. In-house Training.
  3. Internship.

 

 

Tools Used

Industry Specific all relevant tools (Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, mitmproxy, Skipfish and more)

Lab Avaliability

10 AM -5 PM

Credits

60

Placement Potential

As per our data more than 70% People placed and working in the same. We can only assist in Placement

Industry Associates

SIFS India

Accademic Associates

We have Collaboration with Delhi University and Lucknow University

Course Coordinator

Dr Ranjeet Kr Singh CEH, CHFI, MSc., Ph.D

Pricing

INR 25,960 (excluding taxes)

Number of Lecture (L) hours and Practical (P) hours

1500 (40 % Theory and 60% lab)

Differentiators

Students are taught by Industry Level Certified Professionals. A virtual environment created for students helps the participant to practice and perform real-time attacks on a virtual simulation network, advanced level penetration testing techniques, privilege escalation techniques that intruders use to penetrate the network.Wireless Communication standards, Wireless Hacking, Exploit Writing skills, Android and iPhone security, Network Security, and other major concepts which are also included in our course to make participants a complete  Ethical Hacker.Course taught by industry level certified professionals.

Course Curriculum Outline

 

  1. Module 1 – Ethical hacking
  2. Module 2 – Footprinting and reconnaissance
  3. Module 3 – Scanning network
  4. Module 4 – Enumeration
  5. Module 5 – System hacking
  6. Module 6 – Trojans and backdoors
  7. Module 7 – Viruses and worms
  8. Module 8 – Sniffing
  9. Module 9 – Session hijacking
  10. Module 10 – Social engineering
  11. Module 11 – Denial of service (dos)
  12. Module 12 – Hacking webserver
  13. Module 13 – Structured query language injection
  14. Module 14 – Hacking wireless networks
  15. Module 15 – Evading ids, firewalls and honeypot
  16. Module 16 – Buffer overflow
  17. Module 17 – Cryptography
  18. Module 18 – Penetration testing
  19. Module 19 – Mobile hacking
  20. Module 20 – Steganography

 

 

Course Curriculum Outline

 Details - 1

Evaluation

Customised online Examination Portal developed by SIFS India Continuous assessment is done via quizzes, assignments and solving of case studies. Students should score a minimum 40% in each assessment to pass and be certified.

Reference Materials

Books and Study Portal

Course Learning Outcomes

 

Students will learn:
  1. Ethical hacking and its field of hackers.
  2. Foot-printing and its techniques.
  3. Perform effective reconnaissance.
  4. Port, Network and Vulnerability scanning.
  5. Monitor and intercept network traffic.
  6. Fundamentals of enumeration.
  7. Password cracking of documents and Windows.
  8. Attack Windows and Linux systems.
  9. Analysis of malware.
  10. Penetration testing and vulnerability assessment.
  11. Troubleshoot networks using Wireshark.
  12. Set up a VPN server.
  13. Hack wireless networks.
  14. Clone websites.
  15. Learn how to deploy a keylogger from a USB.

 

 

Complete curriculum

 Details - 1

Pre- requisites

 

  1. Basic IT knowledge.
  2. Laptop with good configuration.
  3. Basic knowledge of Computer Languages (C/C++, Java, HTML, Python, and SQL).
  4. USB drive to install Linux.
  5. Wireless card & router access.
  6. Various programs used to demo attacks (FREE).

 

 

Teaching pedagogies

 

  1. Online Learning.
  2. In-house Training.
  3. Internship.

 

 

Tools Used

Industry Specific all relevant tools (Maltego, FOCA, Recon-ng, Nmap, masscan, tcpdump, Wireshark, Ettercap, Burp Suite, Scapy, Mimikatz, Hashcat, Konboot, Hydra, OWASP, mitmproxy, Skipfish and more)

Lab Avaliability

10 AM -5 PM

Credits

60

Placement Potential

As per our data more than 70% People placed and working in the same. We can only assist in Placement

Industry Associates

SIFS India

Accademic Associates

We have Collaboration with Delhi University and Lucknow University

Course Coordinator

Dr Ranjeet Kr Singh CEH, CHFI, MSc., Ph.D

Pricing

INR 25,960 (excluding taxes)


A Knowledge Company