Professional Diploma in Cyber Security


Professional Diploma in Cyber Security (PDCS)

  • Teacher
    Rupayan Bera
  • Category
    Cyber Security
  • Course Price
    ₹125000

The Professional Diploma in Cyber Security provides comprehensive training in safeguarding digital systems. Covering threat detection, risk mitigation, and ethical hacking, this program equips professionals with essential skills to combat evolving cyber threats effectively.

“The Data Security Council of India (DSCI), an association of the cybersecurity ecosystem players, estimates that India will require 64,000 cybersecurity professionals. The DSCI expects the demand for cybersecurity products and services to grow exponentially from 1.10 lakh in 2019 to 10 lakh employees by 2025.”

The future of a Professional Diploma in Cyber Security appears promising, given the escalating importance of cybersecurity in our digital landscape. As cyber threats continue to evolve, professionals with specialized skills in securing digital systems and data will be in high demand, making this diploma a valuable asset for career growth.

Get Started with Professional Certificate in Ethical Hacking

Syllabus:

    Module 1: Networking Fundamentals

  • What Is Networking ?
  • Types Of Networking?
  • IP Class And Their Types
  • What Is Port In Networking?
  • Most Popular Ports
  • What Is Protocol In Networking?
  • What Is OSI Model In Networking ?
  • Working Process Of Osi Layers
  • What Is TCP/IP Model ?
  • TCP/IP 6 Flags
  • OSI V/S TCP/IP Model
  • What Is MAC Address ?
  • Format Of MAC Address
  • What Proxy And Proxy Server?
  • Various Types Of Proxy
  • Types Of Web
  • What Is Onion Routing(Tor)?
  • Advantages & Disadvantages Of Tor
  • What Is VPN Tunneling?
  • Advantages And Disadvantages Of VPN
  • Telnet & SSH Remote Login
  • Module 2: Linux Administration & Virtuliazation

  • What Is Linux?
  • History Of Linux
  • What Is Kernal In Operating System
  • What Is Command Line (CLI)
  • Windows Cmd Vs Linux Shell
  • Some Distributions Of Linux
  • Advantages & Disadvantages Of Linux OS
  • What Is Virtuliazation?
  • Lab Setup Using Vmware Software
  • What Is Kali Linux ?
  • History Of Kali Linux
  • Linux File Structure
  • What Is Root Directory In Linux ?
  • File System & Their Types
  • Linux File System
  • Linux User Permissions
  • Linux File Permissions
  • Basic Linux Commands
  • Linux Networking Commands
  • Linux User Administration
  • Linux User / Group Handaling
  • Delete Linux Users & Groups
  • Install And Remove File From Linux
  • Module 3: ADVANCE NETWORKING CONCEPTS

  • What Is Server ?
  • Working Of Server
  • Request Vs Response
  • Capturing A Html Request
  • What Is Domain Name Server?
  • What Is Zone File ?
  • Records Of Zone File
  • Working Of Dns
  • What Is Server ?
  • Request Vs Response
  • Methods Of Request And Response
  • Capturing A Html Request
  • What Is Netbios Service?
  • What Information Stored In Netbios
  • What Is SNMP Service ?
  • Major Components Of SNMP Service
  • Use Of Network Management System
  • What Is MIB In SNMP Protocol
  • What Is SMTP Protocol ?
  • Common SMTP Commands
  • WIFI Technology In Networking
  • DISCUSSING ABOUT WIFI Channels
  • WIRELESS SECURITY CONCPTS
  • Module 4: Introduction Of Ethical Hacking

  • What Is Hacking & Ethical Hacking?
  • Difference Between Ethical Hacking V/S Hacking?
  • Types Of Hackers
  • Cyber Warfare And Common Cyber Attacks
  • What Is Zero Day Vulnerability
  • Some Popular Terms In Cyber Security Domain
  • Phases Of Ethical Hacking
  • Phases Of Penetration Testing
  • What Is Cyber Law ?
  • What Is It Act ?
  • Module 5: Scanning

  • What Is Information Security?
  • What Is Threats ?
  • What Is Cyber Securty?
  • Objectives Of Cyber Security?
  • What Is CIA Triad ?
  • What Is Hacking & Ethical Hacking?
  • Difference Between Ethical Hacking V/S Hacking?
  • Types Of Hackers
  • Cyber Warfare And Common Cyber Attacks
  • What Is Zero Day Vulnerability
  • Some Popular Terms In Cyber Security Domain
  • Phases Of Ethical Hacking
  • Phases Of Penetration Testing
  • What Is Cyber Law ?
  • What Is It Act ?
  • Module 6: Footprinting

  • What Is Footprinting ?
  • Types Of Footprinnting
  • Importance Of Footpring
  • What Is Open Source Intelligence
  • Objectives Of Open Source Intelligence
  • Footprinting Using Osint Framework
  • Collecting Information From Various Search Engines
  • Website Footprinting
  • Wget For Website Mirroring
  • WHOIS Lookup
  • DNS Footprinting Using Dns Dumpster
  • Web Technology Footpring Using Wpaliazer
  • Footprinting Using Google Dorking
  • Module 7: Scanning & Enumeration

  • Discover Live Host , Open Ports And Running Services, Vulnerabilities
  • Various Types Of Scanning Using NMAP
  • NMAP TCP Scan And Vulnerability Scan
  • NMAP Stealth / Half TCP Scan
  • TCP Fin And Null Scan
  • TCP XMAS , ACK Scan
  • NMAP Aggressive & Service Scan
  • NMAP Firewall And IDS/IPS Bypass
  • NMAP Scan Using Scripts
  • Introduction To Banner Grabbing
  • Banner Grabbing Using Netcat
  • Banner Grabbing Using Netcraft
  • What Is Enumeration?
  • Enumerate User Accounts And Sensitive Credentials
  • Some Popular Services For Enumeration (FTP, SMB etc)
  • Module 8: System Hacking & Exploitation

  • Create A Metasploit Payload
  • What Is DLL Injection In Metasploit
  • Exploit A System
  • Windows Privilage Escalation
  • Linux Privilage Excalation
  • Create A Good Wordlist Using Crunch
  • Password Attacks
  • Hash Cracking
  • Microdoft Authentication
  • What Is Sam File In Windows ?
  • Linux Authentication
  • Linux UID And GID
  • Linux Password Info File
  • What Is Password Salting?
  • Password Salting Process
  • Password Sniffing Using Wireshark
  • What Is Social Engineering?
  • Perform Social Engineering
  • What Is Keylogger?
  • Password Capture Using Keylogger
  • Countermeasures Of UAC Bypass
  • Countermeasures Of Social Engineering
  • Module 9: Malware Threats

  • What Is Malicious Files?
  • Difference Between Normal Files Vs Malicious Files
  • What Is Virus?
  • Working Process Of A Virus?
  • What Is Worms?
  • Working Process Of A Worms
  • Virus Vs Worms
  • What Is Rootkits?
  • Actual Work Of Rootkits
  • Types Of Rootkits
  • What Is Backdoor?
  • Working Of A Backdoor
  • History Of Trojan
  • Working Process Of Trojan
  • Introduction Of Malware Analysis
  • Static And Dynamic Malware Analysis
  • Countermeasures Of Malware
  • Module 10: Web Application Security

  • Introduction Of Web Technologies
  • Concepts About Web Structure
  • HTML And Python Languages For Website
  • Web Security Lab Setup (Burpsuite, Foxyproxy & CA CERT Etc.)
  • Introduction Of Burpsuite
  • Website Request And Response
  • Capturing HTML Requests
  • Introduction Of Web Server
  • DOS & DDOS Attacks In Web Server
  • Introduction Of Web Applications
  • Web Application Security Methodology
  • Web Directory Bruteforcing (DIRB , Goburster Etc.)
  • Web Vulnerability Scanning (Nikto)
  • Cross Site Scripting Vulnerability (XSS)
  • Parameter Tampering & Session Hijacking
  • HTML And SQL Injections
  • OS Command Injection
  • Cross Site Request Forgery Attack (CSRF)
  • Countermeasures Of Web Attacks
  • Module 11: Wireless Network Security

  • Introduction Of Wireless Networks
  • Wireless Security Methodology
  • Various Wireless Attacks
  • Wireless Encryption Techniques
  • Wireless Authentication
  • WiFi Handshake File
  • Types Of Wifi Modes
  • Monitor Vs Managed Mode
  • Introduction Of Wifi Chanels
  • What Is Spoofing?
  • Wireless IP And MAC Spoofing
  • Wifi Man In The Middle Attack
  • Wireless Security Countermeasures
  • Module 12: Mobile Platform Security

  • Introduction Of Mobile Architecture
  • Types Of Threads For Mobile Olatform
  • Introduction Of Android And OS Applications
  • Create A Payload For Mobile Platform
  • Android Hacking Using Metasploit
  • Android Security Major Conceptts
  • Download VPN And Best Anti-Virus For Android
  • Disscusion About Android Secureity
  • Module 13: Cryptography & Stegnography

  • Introduction Of Cryptography
  • Types Of Keys
  • Data Encryption Process
  • Introduction Of Cipher In Encryption Process
  • Encryption Vs Encoding
  • Public Key Vs Private Key
  • Cipher Transposition
  • What Is Stegnography?
  • Types Of Stegnography
  • Evolution Of Stegnography
  • Concepts About Data Streams
  • NTFS Alternative Data Streams
  • Working Of Attributes And Data
  • Manuculating NTFS Ads
  • Countermeasures Of NTFS Alternative Data Streams
  • Text Stegnography
  • Image Stegnography
  • Detect Stegnography
  • Module 14: CLOUD COMPUTING

  • Introduction Of Cloud Computing
  • Benefits Of Cloud Computing
  • Limitations Of Cloud Computing
  • Importance Of Cloud Computing In Corporate World
  • Various Cloud Services Model
  • Loadbalencer Server In Cloud
  • Introduction Of Cloud Security
  • Cloud Security Threats
  • Future Of Cloud Computing

  • Promisingly, Cyber Security diplomas ensure robust career prospects as digital threats evolve. Continuous advancements in technology heighten the demand for skilled professionals, making this diploma a strategic investment for those pursuing a secure and dynamic future.

Course Information

  • Class Start: August 14, 2024
  • Course Duration: 12 Months
  • Total Credits: 24
  • Student Capacity: Max 150 Students
  • Class Schedule: Tuesday & Thursday
  • Class Time: 11.00 am - 01.00 pm & 03.00 pm - 05:00 pm
  • Course Teachers: 01

Eligibility

  • Qualification: Higher Secondary or Equivalent
  • Age: 18 Years
  • Language Known: Any

What you will get.

Online / Offline Class

Tools & Resources worth

Class Video Recording Access

Sahfar Academy Certification

Internship opportunity

100% Job Assistance

Industry Expert Faculty

Lifetime Support

Employment Prospectus

Cybersecurity Analyst

Ethical Hacker

Security Consultant

Incident Responder

Network Security Engineer

Cryptographer

Security Architect

Threat Intelligence Analyst

Penetration Tester

Security Auditor

Forensic Analyst

Security Software Developer

Cloud Security Engineer

Identity and Access Management Specialist

IoT Security Specialist

Course Teachers

Rupayan Bera
Cyber Security Instructor

Course Reviews

Average Rating:4.9

5 Stars156
4 Stars2
3 Stars0
2 Stars0
1 Star0

Comments

  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
    John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
    John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
  • John Doe says:
    23/06/2014

    Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...

    Replay
Leave a Comment