Profesional Program in Cyber Security

  • (5.0)
  • 20569 Ratings
About Course:

The EC-Council

Contact Us

Eligibility Criteria:

Plus Two / Diploma / Any Diploma

Course Duration:

1 Month

Class Mode:

Online/Offline/E-learning

Syllabus
  • Introduction to Ethical HackingFootprinting and ReconnaissanceScanning NetworksEnumerationVulnerability AnalysisSystem HackingMalware ThreatsSniffingSocial Engineerin Denial-of-ServiceSession HijackingEvading IDSFirewalls and HoneypotsHacking Web ServersHacking Web ApplicationsSQL InjectionHacking Wireless NetworksHacking Mobile PlatformsIoT and OT HackingCloud ComputingCryptographyIntroduction to Penetration TestingPenetration Testing Scoping and EngagementOpen Source Intelligence OSINT)Social Engineering Penetration TestingNetwork Penetration Testing – ExternalNetwork Penetration Testing– InternalNetwork Penetration Testing – Perimeter DevicesWeb Application Penetration TestingWireless Penetration TestingWireless Penetration TestingIoT Penetration TestingOT/SCADA Penetration TestingCloud Penetration TestingBinary Analysis and ExploitationReport Writing and Post Testing ActionsForensic Computer AnalystComputer Forensics Criminal InvestigatorIntelligence Technology AnlystDisater Recovery ExpertCryptographerCryptanalystComputer Crime InvestigatorMoblie Forensics ExpertInformation Technology AuditorDigital Crime SpecialistCyber Defense Forensic AnalystForensic AnalystCyber Crime InvestigatorInformation System Security ProfessionalForensics AccountantInformation Security AnalystMalware AnalystComputer Forensics ExaminerSecurity ConsultantComputer Forensics TechnicianNetwork Attacks and Defense StrategiesAdministrative Network SecurityTechnical Network SecurityNetwork Perimeter SecurityEndpoint Security- Windows SystemsEndpoint Security- Linux SystemsEndpoint Security- Mobile DevicesEndpoint Security-IoT DevicesAdministrative Application SecurityData SecurityEnterprise Virtual Network SecurityEnterprise Cloud Network SecurityEnterprise Wireless Network SecurityNetwork Traffic Monitoring and AnalysisNetwork Logs Monitoring and AnalysisIncident Response and Forensic InvestigationBusiness Continuity and Disaster RecoveryRisk Anticipation with Risk ManagementThreat Assessment with Attack Surface AnalysisThreat Prediction With Cyber Threat Intelligence


Benefits of Studying
  • Law Enforcement AgenciesGovernment AgenciesPrivate CorporationsConsulting FirmsLegal FirmsFinancial InstitutionsNonprofit OrganizationsAcademic and Research InstitutionsTechnology Companies,Healthcare Organizations.


Departments where you can work

1. Cybersecurity Departments

2.  Law Enforcement Agencies

3.  Digital Forensics Teams 

4.  Incident Response Teams

5.  Government Agencies

6.  Legal and Compliance Departments

7.  Consulting Firm

Reviews from Students

See What Students are saying..

Please Wait...