Professional Diploma in Cyber Security (PDCS)
-
Teacher
Rupayan Bera
-
Category
Cyber Security
-
Course Price
₹125000
The Professional Diploma in Cyber Security provides comprehensive training in safeguarding digital systems. Covering threat detection, risk mitigation, and ethical hacking, this program equips professionals with essential skills to combat evolving cyber threats effectively.
“The Data Security Council of India (DSCI), an association of the cybersecurity ecosystem players, estimates that India will require 64,000 cybersecurity professionals. The DSCI expects the demand for cybersecurity products and services to grow exponentially from 1.10 lakh in 2019 to 10 lakh employees by 2025.”
The future of a Professional Diploma in Cyber Security appears promising, given the escalating importance of cybersecurity in our digital landscape. As cyber threats continue to evolve, professionals with specialized skills in securing digital systems and data will be in high demand, making this diploma a valuable asset for career growth.
Get Started with Professional Certificate in Ethical Hacking
Syllabus:
- What Is Networking ?
- Types Of Networking?
- IP Class And Their Types
- What Is Port In Networking?
- Most Popular Ports
- What Is Protocol In Networking?
- What Is OSI Model In Networking ?
- Working Process Of Osi Layers
- What Is TCP/IP Model ?
- TCP/IP 6 Flags
- OSI V/S TCP/IP Model
- What Is MAC Address ?
- Format Of MAC Address
- What Proxy And Proxy Server?
- Various Types Of Proxy
- Types Of Web
- What Is Onion Routing(Tor)?
- Advantages & Disadvantages Of Tor
- What Is VPN Tunneling?
- Advantages And Disadvantages Of VPN
- Telnet & SSH Remote Login
- What Is Linux?
- History Of Linux
- What Is Kernal In Operating System
- What Is Command Line (CLI)
- Windows Cmd Vs Linux Shell
- Some Distributions Of Linux
- Advantages & Disadvantages Of Linux OS
- What Is Virtuliazation?
- Lab Setup Using Vmware Software
- What Is Kali Linux ?
- History Of Kali Linux
- Linux File Structure
- What Is Root Directory In Linux ?
- File System & Their Types
- Linux File System
- Linux User Permissions
- Linux File Permissions
- Basic Linux Commands
- Linux Networking Commands
- Linux User Administration
- Linux User / Group Handaling
- Delete Linux Users & Groups
- Install And Remove File From Linux
- What Is Server ?
- Working Of Server
- Request Vs Response
- Capturing A Html Request
- What Is Domain Name Server?
- What Is Zone File ?
- Records Of Zone File
- Working Of Dns
- What Is Server ?
- Request Vs Response
- Methods Of Request And Response
- Capturing A Html Request
- What Is Netbios Service?
- What Information Stored In Netbios
- What Is SNMP Service ?
- Major Components Of SNMP Service
- Use Of Network Management System
- What Is MIB In SNMP Protocol
- What Is SMTP Protocol ?
- Common SMTP Commands
- WIFI Technology In Networking
- DISCUSSING ABOUT WIFI Channels
- WIRELESS SECURITY CONCPTS
- What Is Hacking & Ethical Hacking?
- Difference Between Ethical Hacking V/S Hacking?
- Types Of Hackers
- Cyber Warfare And Common Cyber Attacks
- What Is Zero Day Vulnerability
- Some Popular Terms In Cyber Security Domain
- Phases Of Ethical Hacking
- Phases Of Penetration Testing
- What Is Cyber Law ?
- What Is It Act ?
- What Is Information Security?
- What Is Threats ?
- What Is Cyber Securty?
- Objectives Of Cyber Security?
- What Is CIA Triad ?
- What Is Hacking & Ethical Hacking?
- Difference Between Ethical Hacking V/S Hacking?
- Types Of Hackers
- Cyber Warfare And Common Cyber Attacks
- What Is Zero Day Vulnerability
- Some Popular Terms In Cyber Security Domain
- Phases Of Ethical Hacking
- Phases Of Penetration Testing
- What Is Cyber Law ?
- What Is It Act ?
- What Is Footprinting ?
- Types Of Footprinnting
- Importance Of Footpring
- What Is Open Source Intelligence
- Objectives Of Open Source Intelligence
- Footprinting Using Osint Framework
- Collecting Information From Various Search Engines
- Website Footprinting
- Wget For Website Mirroring
- WHOIS Lookup
- DNS Footprinting Using Dns Dumpster
- Web Technology Footpring Using Wpaliazer
- Footprinting Using Google Dorking
- Discover Live Host , Open Ports And Running Services, Vulnerabilities
- Various Types Of Scanning Using NMAP
- NMAP TCP Scan And Vulnerability Scan
- NMAP Stealth / Half TCP Scan
- TCP Fin And Null Scan
- TCP XMAS , ACK Scan
- NMAP Aggressive & Service Scan
- NMAP Firewall And IDS/IPS Bypass
- NMAP Scan Using Scripts
- Introduction To Banner Grabbing
- Banner Grabbing Using Netcat
- Banner Grabbing Using Netcraft
- What Is Enumeration?
- Enumerate User Accounts And Sensitive Credentials
- Some Popular Services For Enumeration (FTP, SMB etc)
- Create A Metasploit Payload
- What Is DLL Injection In Metasploit
- Exploit A System
- Windows Privilage Escalation
- Linux Privilage Excalation
- Create A Good Wordlist Using Crunch
- Password Attacks
- Hash Cracking
- Microdoft Authentication
- What Is Sam File In Windows ?
- Linux Authentication
- Linux UID And GID
- Linux Password Info File
- What Is Password Salting?
- Password Salting Process
- Password Sniffing Using Wireshark
- What Is Social Engineering?
- Perform Social Engineering
- What Is Keylogger?
- Password Capture Using Keylogger
- Countermeasures Of UAC Bypass
- Countermeasures Of Social Engineering
- What Is Malicious Files?
- Difference Between Normal Files Vs Malicious Files
- What Is Virus?
- Working Process Of A Virus?
- What Is Worms?
- Working Process Of A Worms
- Virus Vs Worms
- What Is Rootkits?
- Actual Work Of Rootkits
- Types Of Rootkits
- What Is Backdoor?
- Working Of A Backdoor
- History Of Trojan
- Working Process Of Trojan
- Introduction Of Malware Analysis
- Static And Dynamic Malware Analysis
- Countermeasures Of Malware
- Introduction Of Web Technologies
- Concepts About Web Structure
- HTML And Python Languages For Website
- Web Security Lab Setup (Burpsuite, Foxyproxy & CA CERT Etc.)
- Introduction Of Burpsuite
- Website Request And Response
- Capturing HTML Requests
- Introduction Of Web Server
- DOS & DDOS Attacks In Web Server
- Introduction Of Web Applications
- Web Application Security Methodology
- Web Directory Bruteforcing (DIRB , Goburster Etc.)
- Web Vulnerability Scanning (Nikto)
- Cross Site Scripting Vulnerability (XSS)
- Parameter Tampering & Session Hijacking
- HTML And SQL Injections
- OS Command Injection
- Cross Site Request Forgery Attack (CSRF)
- Countermeasures Of Web Attacks
- Introduction Of Wireless Networks
- Wireless Security Methodology
- Various Wireless Attacks
- Wireless Encryption Techniques
- Wireless Authentication
- WiFi Handshake File
- Types Of Wifi Modes
- Monitor Vs Managed Mode
- Introduction Of Wifi Chanels
- What Is Spoofing?
- Wireless IP And MAC Spoofing
- Wifi Man In The Middle Attack
- Wireless Security Countermeasures
- Introduction Of Mobile Architecture
- Types Of Threads For Mobile Olatform
- Introduction Of Android And OS Applications
- Create A Payload For Mobile Platform
- Android Hacking Using Metasploit
- Android Security Major Conceptts
- Download VPN And Best Anti-Virus For Android
- Disscusion About Android Secureity
- Introduction Of Cryptography
- Types Of Keys
- Data Encryption Process
- Introduction Of Cipher In Encryption Process
- Encryption Vs Encoding
- Public Key Vs Private Key
- Cipher Transposition
- What Is Stegnography?
- Types Of Stegnography
- Evolution Of Stegnography
- Concepts About Data Streams
- NTFS Alternative Data Streams
- Working Of Attributes And Data
- Manuculating NTFS Ads
- Countermeasures Of NTFS Alternative Data Streams
- Text Stegnography
- Image Stegnography
- Detect Stegnography
- Introduction Of Cloud Computing
- Benefits Of Cloud Computing
- Limitations Of Cloud Computing
- Importance Of Cloud Computing In Corporate World
- Various Cloud Services Model
- Loadbalencer Server In Cloud
- Introduction Of Cloud Security
- Cloud Security Threats
- Future Of Cloud Computing
Module 1: Networking Fundamentals
Module 2: Linux Administration & Virtuliazation
Module 3: ADVANCE NETWORKING CONCEPTS
Module 4: Introduction Of Ethical Hacking
Module 5: Scanning
Module 6: Footprinting
Module 7: Scanning & Enumeration
Module 8: System Hacking & Exploitation
Module 9: Malware Threats
Module 10: Web Application Security
Module 11: Wireless Network Security
Module 12: Mobile Platform Security
Module 13: Cryptography & Stegnography
Module 14: CLOUD COMPUTING
Promisingly, Cyber Security diplomas ensure robust career prospects as digital threats evolve. Continuous advancements in technology heighten the demand for skilled professionals, making this diploma a strategic investment for those pursuing a secure and dynamic future.
Course Information
- Class Start: August 14, 2024
- Course Duration: 12 Months
- Total Credits: 24
- Student Capacity: Max 150 Students
- Class Schedule: Tuesday & Thursday
- Class Time: 11.00 am - 01.00 pm & 03.00 pm - 05:00 pm
- Course Teachers: 01
Eligibility
- Qualification: Higher Secondary or Equivalent
- Age: 18 Years
- Language Known: Any
What you will get.
Online / Offline Class
Tools & Resources worth
Class Video Recording Access
Sahfar Academy Certification
Internship opportunity
100% Job Assistance
Industry Expert Faculty
Lifetime Support
Employment Prospectus
Cybersecurity Analyst
Ethical Hacker
Security Consultant
Incident Responder
Network Security Engineer
Cryptographer
Security Architect
Threat Intelligence Analyst
Penetration Tester
Security Auditor
Forensic Analyst
Security Software Developer
Cloud Security Engineer
Identity and Access Management Specialist
IoT Security Specialist
John Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
ReplayJohn Doe says:
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna et sed aliqua. Ut enim ea commodo consequat...
Replay