Professional Certificate in Ethical Hacking


Professional Certificate in Ethical Hacking (PC|EH)

  • Teacher
    Rupayan Bera
  • Category
    Cyber Security
  • Course Price
    ₹65000

The Professional Certificate in Ethical Hacking provides comprehensive training in ethical hacking techniques. This program equips individuals with the skills to identify and address cybersecurity vulnerabilities, ensuring a proactive approach to securing digital assets in today's dynamic threat landscape.

“Many professionals with C|EH certification have reported that it advanced their careers, increased their credibility and value as cybersecurity professionals, and opened doors to greater opportunities in the field. The C|EH certification is an essential step in building a successful career in cybersecurity.”

A professional certificate in ethical hacking offers comprehensive insights into cybersecurity, providing practical skills for identifying and addressing vulnerabilities. It validates expertise in ethical hacking methodologies, enabling individuals to enhance organizational security, conduct penetration testing, and pursue rewarding roles in the rapidly evolving field of cybersecurity.

Get Started with Professional Certificate in Ethical Hacking

Syllabus:

    Module 1: Networking Concepts

  • What Is Networking ?
  • Types Of Networking?
  • IP Class And Their Types
  • What Is Port In Networking?
  • Most Popular Ports
  • What Is Protocol In Networking?
  • What Is OSI Model In Networking ?
  • Working Process Of OSI Layers
  • What Is TCP/IP Model ?
  • TCP/IP 6 Flags
  • OSI V/S TCP/IP Model
  • What Is Mac Address ?
  • Format Of Mac Address
  • What Proxy And Proxy Server?
  • Various Types Of Proxy
  • Types Of Internet Web
  • What Is Onion Routing(Tor)
  • Download Tor Browser
  • Advantages & Disadvantages Of Tor
  • What Is VPN Tunneling?
  • Advantages And Disadvantages Of VPN
  • Telnet & SSH Remote Login
  • Module 2: Linux Concepts

  • What Is Linux?
  • History Of Linux
  • What Is Kernal In Operating System
  • What Is Command Line (Cli)
  • Windows CMD Vs Linux Shell
  • Some Distributions Of Linux
  • Advantages & Disadvantages Of Linux Os
  • What Is Virtuliazation?
  • Lab Setup Using Vmware Software
  • What Is Kali Linux ?
  • History Of Kali Linux
  • Linux File Structure
  • What Is Root Directory In Linux ?
  • File System & Their Types
  • Linux File System
  • Linux User Permissions
  • Linux File Permissions
  • Basic Linux Commands
  • Linux Networking Commands
  • Linux Advance Commands
  • Linux Package Manager (Apt ,Dpkg Etc.)
  • Introduction Of Github
  • Install And Remove File From Linux
  • Module 3: Introduction Of Ethical Hacking

  • What Is Hacking & Ethical Hacking?
  • Difference Between Ethical Hacking V/S Hacking?
  • Types Of Hackers
  • Cyber Warfare And Common Cyber Attacks
  • What Is Zero Day Vulnerability
  • Some Popular Terms In Cyber Security Domain
  • Phases Of Ethical Hacking
  • Phases Of Penetration Testing
  • What Is Cyber Law ?
  • What Is It Act ?
  • Module 4: Footprinting & Recon

  • What Is Footprinting ?
  • Types Of Footprinnting
  • Importance Of Footpring
  • What Is Open Source Intelligence
  • Objectives Of Open Source Intelligence
  • Footprinting Using Osint Framework
  • Collecting Information From Various Search Engines
  • Website Footprinting
  • Wget For Website Mirroring
  • WHOIS Lookup
  • Dns Footprinting Using Dns Dumpster
  • Web Technology Footpring Using Wpaliazer
  • Footprinting Using Google Dorking
  • Module 5: Scanning

  • Discover Live Host , Open Ports And Running Services, Vulnerabilities
  • Various Types Of Scanning Using NMAP
  • NMAP TCP Scan And Vulnerability Scan
  • NMAP Stealth / Half TCP Scan
  • TCP Fin And Null Scan
  • TCP XMAS , ACK Scan
  • NMAP Aggressive & Service Scan
  • NMAP Firewall AND IDS/IPS Bypass
  • NMAP Scan Using Scripts
  • Introduction To Banner Grabbing
  • Banner Grabbing Using Netcat
  • Banner Grabbing Using Netcraft
  • Module 6: Enumeration

  • What Is Enumeration?
  • Enumeration Using NMAP
  • Netbios Enumeration
  • SMTP Enumeration
  • SNMP Enumeration
  • FTP Enumeration
  • Enumerate User Accounts And Sensitive Credentials
  • Some Popular Services For Enumeration
  • Countermeasures Of Enumeration
  • Module 7: Vulnerability Assessment

  • Finding Security Loop Holes In A Target Network , Webserver And Some It Infrastructure
  • Analyzing Service Version For Potential Loop Holes
  • Research About Vulnerabilities In Internet
  • Vulnerability Research In Searchsploit
  • Vulnerability Research In Google Hacking Database
  • Introduction Of Exploitation Framework(Metasploit)
  • Metasploit Architecture
  • Components Of Metasploit Frameworks
  • Metasploit Payload Module
  • Metasploit Exploit Module
  • Metasploit Scanner Module
  • Module 8: System Hacking

  • Create A Metasploit Payload
  • Host A Payload With Python Server
  • Exploit A System
  • What Is User Access Control Mechanism
  • Windows Privilage Escalation
  • Linux Privilage Excalation
  • Create A Good Wordlist Using Crunch
  • Password Attacks
  • Hash Cracking
  • Microdoft Authentication
  • What Is SAM File In Windows ?
  • Linux Authentication
  • Linux UID And GID
  • Linux Password Info File
  • What Is Password Salting?
  • Password Salting Process
  • Password Sniffing Using Wireshark
  • What Is Social Engineering?
  • Perform Social Engineering
  • What Is Keylogger?
  • Password Capture Using Keylogger
  • Countermeasures Of Keylogger
  • Countermeasures Of Uac Bypassing
  • Countermeasures Of Social Engineering
  • Module 9: Malware Threats

  • What Is Malicious Files?
  • Difference Between Normal Files Vs Malicious Files
  • What Is Virus?
  • Working Process Of A Virus?
  • What Is Worms?
  • Working Process Of A Worms
  • Virus Vs Worms
  • What Is Rootkits?
  • Actual Work Of Rootkits
  • Types Of Rootkits
  • What Is Backdoor?
  • Working Of A Backdoor
  • History Of Trojan
  • Working Process Of Trojan
  • Introduction Of Malware Analysis
  • Static And Dynamic Malware Analysis
  • Countermeasures Of Malware
  • Countermeasures Of Spyware
  • Countermeasures Of Rootkits
  • Countermeasures Of Worms And Virus
  • Module 10: Web Application Security

  • Introduction Of Web Technologies
  • Concepts About Web Structure
  • Web Security Lab Setup (Burpsuite, Foxyproxy & Ca Cert Etc.)
  • What Is Cookies?
  • Introduction Of Burpsuite
  • Website Request And Response
  • Capturing Html Requests
  • Introduction Of Web Server
  • DOS & DDOS Attacks In Web Server
  • Introduction Of Web Applications
  • Web Application Security Methodology
  • Web Directory Bruteforcing (Dirb , Goburster Etc.)
  • Web Vulnerability Scanning (Nikto)
  • Cross Site Scripting Vulnerability (Xss)
  • Parameter Tampering & Session Hijacking
  • SQL Injection
  • OS Command Injection
  • Session Hijacking
  • Cross Site Request Forgery Attack (Csrf)
  • Countermeasures Of Web Attacks
  • Module 11: MOBILE SECURITY

  • Introduction Of Mobile Architecture
  • Types Of Threads For Mobile Olatform
  • Introduction Of Android Os And Applications
  • Create A Payload For Mobile Platform
  • Android Hacking Using Metasploit
  • Android Security Major Conceptts
  • Download VPN And Best Anti-Virus For Android
  • Disscusion About Android Secureity
  • Module 12: Cryptography

  • Introduction Of Cryptography
  • Types Of Keys
  • Data Encryption Process
  • Introduction Of Cipher In Encryption Process
  • Encryption Vs Encoding
  • Public Key Vs Private Key
  • Cipher Transposition
  • Module 13: Evading Firewall

  • Introduction Of Firewall
  • Firewall Atchitecture
  • Introduction Of IDS
  • Introduction Of IPS
  • Detection Process Of IDS
  • Evading Firewall Mechanism
  • Introduction Of Honeyports
  • Concepts About Botnets
  • Module 14: Cloud Computing

  • Introduction Of Cloud Computing
  • Benefits Of Cloud Computing
  • Limitations Of Cloud Computing
  • Importance Of Cloud Computing In Corporate World
  • Various Cloud Services Model
  • Loadbalencer Server In Cloud
  • Introduction Of Cloud Security
  • Cloud Security Threats
  • Future Of Cloud Computing

  • A professional certificate in ethical hacking demonstrates expertise in identifying and addressing cybersecurity vulnerabilities. This credential signifies a commitment to ethical practices, continuous learning, and the ability to protect systems, instilling trust in organizations seeking skilled cybersecurity professionals.

Course Information

  • Class Start: August 14, 2024
  • Course Duration: 6 Months
  • Total Credits: 18
  • Student Capacity: Max 150 Students
  • Class Schedule: Tuesday & Thursday
  • Class Time: 11.00 am - 01.00 pm & 03.00 pm - 05:00 pm
  • Course Teachers: 01

Eligibility

  • Qualification: Higher Secondary or Equivalent
  • Age: 18 Years
  • Language Known: Any

What you will get.

Online / Offline Class

Tools & Resources worth

Class Video Recording Access

Sahfar Academy Certification

Internship opportunity

100% Job Assistance

Industry Expert Faculty

Lifetime Support

Employment Prospectus

Ethical Hacker/Penetration Tester

Security Analyst

Security Consultant

Incident Responder

Security Auditor

Security Engineer

Network Security Analyst

Web Application Security Tester

Security Researcher

Forensic Analyst

Security Trainer/Instructor

Security Manager

Security Compliance Analyst

Malware Analyst

Security Operations Center (SOC) Analyst

Course Teachers

Rupayan Bera
Cyber Security Instructor

Course Reviews

Average Rating:4.9

5 Stars144
4 Stars2
3 Stars0
2 Stars0
1 Star0

Comments

  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
    John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
    John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
Leave a Comment