Professional Certificate in Ethical Hacking (PC|EH)
-
Teacher
Rupayan Bera
-
Category
Cyber Security
-
Course Price
₹65000
The Professional Certificate in Ethical Hacking provides comprehensive training in ethical hacking techniques. This program equips individuals with the skills to identify and address cybersecurity vulnerabilities, ensuring a proactive approach to securing digital assets in today's dynamic threat landscape.
“Many professionals with C|EH certification have reported that it advanced their careers, increased their credibility and value as cybersecurity professionals, and opened doors to greater opportunities in the field. The C|EH certification is an essential step in building a successful career in cybersecurity.”
A professional certificate in ethical hacking offers comprehensive insights into cybersecurity, providing practical skills for identifying and addressing vulnerabilities. It validates expertise in ethical hacking methodologies, enabling individuals to enhance organizational security, conduct penetration testing, and pursue rewarding roles in the rapidly evolving field of cybersecurity.
Get Started with Professional Certificate in Ethical Hacking
Syllabus:
- What Is Networking ?
- Types Of Networking?
- IP Class And Their Types
- What Is Port In Networking?
- Most Popular Ports
- What Is Protocol In Networking?
- What Is OSI Model In Networking ?
- Working Process Of OSI Layers
- What Is TCP/IP Model ?
- TCP/IP 6 Flags
- OSI V/S TCP/IP Model
- What Is Mac Address ?
- Format Of Mac Address
- What Proxy And Proxy Server?
- Various Types Of Proxy
- Types Of Internet Web
- What Is Onion Routing(Tor)
- Download Tor Browser
- Advantages & Disadvantages Of Tor
- What Is VPN Tunneling?
- Advantages And Disadvantages Of VPN
- Telnet & SSH Remote Login
- What Is Linux?
- History Of Linux
- What Is Kernal In Operating System
- What Is Command Line (Cli)
- Windows CMD Vs Linux Shell
- Some Distributions Of Linux
- Advantages & Disadvantages Of Linux Os
- What Is Virtuliazation?
- Lab Setup Using Vmware Software
- What Is Kali Linux ?
- History Of Kali Linux
- Linux File Structure
- What Is Root Directory In Linux ?
- File System & Their Types
- Linux File System
- Linux User Permissions
- Linux File Permissions
- Basic Linux Commands
- Linux Networking Commands
- Linux Advance Commands
- Linux Package Manager (Apt ,Dpkg Etc.)
- Introduction Of Github
- Install And Remove File From Linux
- What Is Hacking & Ethical Hacking?
- Difference Between Ethical Hacking V/S Hacking?
- Types Of Hackers
- Cyber Warfare And Common Cyber Attacks
- What Is Zero Day Vulnerability
- Some Popular Terms In Cyber Security Domain
- Phases Of Ethical Hacking
- Phases Of Penetration Testing
- What Is Cyber Law ?
- What Is It Act ?
- What Is Footprinting ?
- Types Of Footprinnting
- Importance Of Footpring
- What Is Open Source Intelligence
- Objectives Of Open Source Intelligence
- Footprinting Using Osint Framework
- Collecting Information From Various Search Engines
- Website Footprinting
- Wget For Website Mirroring
- WHOIS Lookup
- Dns Footprinting Using Dns Dumpster
- Web Technology Footpring Using Wpaliazer
- Footprinting Using Google Dorking
- Discover Live Host , Open Ports And Running Services, Vulnerabilities
- Various Types Of Scanning Using NMAP
- NMAP TCP Scan And Vulnerability Scan
- NMAP Stealth / Half TCP Scan
- TCP Fin And Null Scan
- TCP XMAS , ACK Scan
- NMAP Aggressive & Service Scan
- NMAP Firewall AND IDS/IPS Bypass
- NMAP Scan Using Scripts
- Introduction To Banner Grabbing
- Banner Grabbing Using Netcat
- Banner Grabbing Using Netcraft
- What Is Enumeration?
- Enumeration Using NMAP
- Netbios Enumeration
- SMTP Enumeration
- SNMP Enumeration
- FTP Enumeration
- Enumerate User Accounts And Sensitive Credentials
- Some Popular Services For Enumeration
- Countermeasures Of Enumeration
- Finding Security Loop Holes In A Target Network , Webserver And Some It Infrastructure
- Analyzing Service Version For Potential Loop Holes
- Research About Vulnerabilities In Internet
- Vulnerability Research In Searchsploit
- Vulnerability Research In Google Hacking Database
- Introduction Of Exploitation Framework(Metasploit)
- Metasploit Architecture
- Components Of Metasploit Frameworks
- Metasploit Payload Module
- Metasploit Exploit Module
- Metasploit Scanner Module
- Create A Metasploit Payload
- Host A Payload With Python Server
- Exploit A System
- What Is User Access Control Mechanism
- Windows Privilage Escalation
- Linux Privilage Excalation
- Create A Good Wordlist Using Crunch
- Password Attacks
- Hash Cracking
- Microdoft Authentication
- What Is SAM File In Windows ?
- Linux Authentication
- Linux UID And GID
- Linux Password Info File
- What Is Password Salting?
- Password Salting Process
- Password Sniffing Using Wireshark
- What Is Social Engineering?
- Perform Social Engineering
- What Is Keylogger?
- Password Capture Using Keylogger
- Countermeasures Of Keylogger
- Countermeasures Of Uac Bypassing
- Countermeasures Of Social Engineering
- What Is Malicious Files?
- Difference Between Normal Files Vs Malicious Files
- What Is Virus?
- Working Process Of A Virus?
- What Is Worms?
- Working Process Of A Worms
- Virus Vs Worms
- What Is Rootkits?
- Actual Work Of Rootkits
- Types Of Rootkits
- What Is Backdoor?
- Working Of A Backdoor
- History Of Trojan
- Working Process Of Trojan
- Introduction Of Malware Analysis
- Static And Dynamic Malware Analysis
- Countermeasures Of Malware
- Countermeasures Of Spyware
- Countermeasures Of Rootkits
- Countermeasures Of Worms And Virus
- Introduction Of Web Technologies
- Concepts About Web Structure
- Web Security Lab Setup (Burpsuite, Foxyproxy & Ca Cert Etc.)
- What Is Cookies?
- Introduction Of Burpsuite
- Website Request And Response
- Capturing Html Requests
- Introduction Of Web Server
- DOS & DDOS Attacks In Web Server
- Introduction Of Web Applications
- Web Application Security Methodology
- Web Directory Bruteforcing (Dirb , Goburster Etc.)
- Web Vulnerability Scanning (Nikto)
- Cross Site Scripting Vulnerability (Xss)
- Parameter Tampering & Session Hijacking
- SQL Injection
- OS Command Injection
- Session Hijacking
- Cross Site Request Forgery Attack (Csrf)
- Countermeasures Of Web Attacks
- Introduction Of Mobile Architecture
- Types Of Threads For Mobile Olatform
- Introduction Of Android Os And Applications
- Create A Payload For Mobile Platform
- Android Hacking Using Metasploit
- Android Security Major Conceptts
- Download VPN And Best Anti-Virus For Android
- Disscusion About Android Secureity
- Introduction Of Cryptography
- Types Of Keys
- Data Encryption Process
- Introduction Of Cipher In Encryption Process
- Encryption Vs Encoding
- Public Key Vs Private Key
- Cipher Transposition
- Introduction Of Firewall
- Firewall Atchitecture
- Introduction Of IDS
- Introduction Of IPS
- Detection Process Of IDS
- Evading Firewall Mechanism
- Introduction Of Honeyports
- Concepts About Botnets
- Introduction Of Cloud Computing
- Benefits Of Cloud Computing
- Limitations Of Cloud Computing
- Importance Of Cloud Computing In Corporate World
- Various Cloud Services Model
- Loadbalencer Server In Cloud
- Introduction Of Cloud Security
- Cloud Security Threats
- Future Of Cloud Computing
Module 1: Networking Concepts
Module 2: Linux Concepts
Module 3: Introduction Of Ethical Hacking
Module 4: Footprinting & Recon
Module 5: Scanning
Module 6: Enumeration
Module 7: Vulnerability Assessment
Module 8: System Hacking
Module 9: Malware Threats
Module 10: Web Application Security
Module 11: MOBILE SECURITY
Module 12: Cryptography
Module 13: Evading Firewall
Module 14: Cloud Computing
A professional certificate in ethical hacking demonstrates expertise in identifying and addressing cybersecurity vulnerabilities. This credential signifies a commitment to ethical practices, continuous learning, and the ability to protect systems, instilling trust in organizations seeking skilled cybersecurity professionals.
Course Information
- Class Start: August 14, 2024
- Course Duration: 6 Months
- Total Credits: 18
- Student Capacity: Max 150 Students
- Class Schedule: Tuesday & Thursday
- Class Time: 11.00 am - 01.00 pm & 03.00 pm - 05:00 pm
- Course Teachers: 01
Eligibility
- Qualification: Higher Secondary or Equivalent
- Age: 18 Years
- Language Known: Any
What you will get.
Online / Offline Class
Tools & Resources worth
Class Video Recording Access
Sahfar Academy Certification
Internship opportunity
100% Job Assistance
Industry Expert Faculty
Lifetime Support
Employment Prospectus
Ethical Hacker/Penetration Tester
Security Analyst
Security Consultant
Incident Responder
Security Auditor
Security Engineer
Network Security Analyst
Web Application Security Tester
Security Researcher
Forensic Analyst
Security Trainer/Instructor
Security Manager
Security Compliance Analyst
Malware Analyst
Security Operations Center (SOC) Analyst
John Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
Replay