Profesional Program in Cyber Forensic

  • (5.0)
  • 20569 Ratings
About Course:

EC-Council

Contact Us

Eligibility Criteria:

Plus Two / Diploma / Any Graduation

Course Duration:

1 year

Class Mode:

Online/Offline/E-learning

Syllabus

1.. Introduction to Ethical Hacking

2. Foot printing and Reconnaissance

3. Scanning Networks

4. Enumeration

5. Vulnerability Analysis

6. System Hacking

7. Malware Threats

8. Sniffing

9. Social Engineering

10. Denial-of-Service

11. Session Hijacking

12. Evading IDS

13. Firewalls and Honeypots

14. Hacking Web Servers 

15. Hacking Web Applications

16. SQL Injection

17. Hacking Wireless Networks

18. Hacking Mobile Platforms

19. IoT and OT Hacking

20. Cloud Computing

21. Cryptography

22. Introduction to Penetration Testing

23. Penetration Testing Scoping and Engagement

24. Open Source Intelligence (OSINT)

25. Social Engineering Penetration Testing

26. Network Penetration Testing External

27. Network Penetration Testing Internal

28. Network Penetration Testing – Perimeter Devices

29. Web Application Penetration Testing

30. Wireless Penetration Testing

31. Wireless Penetration Testing

32. IoT Penetration Testing

33. OT/SCADA Penetration Testing

34. Cloud Penetration Testing

35. Binary Analysis and Exploitation

36. Report Writing and Post Testing Actions

37. Forensic Computer Analyst

38. Computer Forensics Criminal Investigator

39. Intelligence Technology Analyst

40. Disaster Recovery Expert

41. Cryptographer 

42. Crypt analyst

43. Computer Crime Investigator

44. Mobile Forensics Expert

45. Information Technology Auditor

46. Digital Crime Specialist

47. Cyber Defense Forensic Analyst

48. Forensic Analyst

49. Cyber Crime Investigator

50. Information System Security Professional

51. Forensics Accountant

52. Information Security Analyst

53. Malware Analyst

54. Computer Forensics Examiner

55. Security Consultant

56. Computer Forensics Technician

57. Network Attacks and Defense Strategies

58. Administrative Network Security

59. Technical Network Security

60. Network Perimeter Security

61. Endpoint Security- Windows Systems

62. Endpoint Security- Linux Systems

63. Endpoint Security- Mobile Devices

64. Endpoint Security-IoT Devices

65. Administrative Application Security

66. Data Security

67. Enterprise Virtual Network Security

68. Enterprise Cloud Network Security 

69. Enterprise Wireless Network Security

70. Network Traffic Monitoring and Analysis

71. Network Logs Monitoring and Analysis

72. Incident Response and Forensic Investigation

73. Business Continuity and Disaster Recovery

74. Risk Anticipation with Risk Management

75. Threat Assessment with Attack Surface Analysis

76. Threat Prediction With Cyber Threat Intelligence

Benefits of Studying

1. Health Information Security

2.Cybersecurity Companies

3. Research Positions

4. Digital Rights and Privacy Advocacy Groups 

5. Fraud Investigation Units

6. Digital Forensic Consultants

7. Cybersecurity Consultancies

8. IT Departments

9. Corporate Security Departments

10.National Security Agencies 11.Cyber crime Units.

Reviews from Students

See What Students are saying..

Please Wait...