+91 9702570087
Diploma in Computer Application(DCA)
Diploma In Ethical Hacking
Introduction to Computer Security & Ethical Hacking
- Types of Hackers
- Ethical Hacking Importance, Scope & Limitations
- Skills of Ethical Hacker
Networking
- Basics of Ip
- Types of Ip's
- IANA / Allotment of Ip's
- Domains
- Ping and Ping Sweep
Footprinting and Reconnaissance
a. Footprinting Concepts
b. Types of Footprinting
- Footprinting through Search Engines
- Footprinting through Websites
- Footprinting through Email
- Footprinting through Network
Lab Preparation (Installing Multiple OS)
- Virtualization Technology
- Downloading & Installing Virtual Box
- Downloading & Installation of Operating Systems (Parrot Sec OS, Windows 10,Windows Server 2016, Windows 7, Metasploitable, Android)
Scanning Networks
- Need for Network Scanning
- Scanning Methodologies
- Proxy Servers
- Proxy Tools
Enumeration
- Significance of Enumeration
- Enumeration Concepts
- Enumeration Using Nmap
- Enumeration Using Super Scan Tool
- Enumeration Countermeasures
Vulnerability Analysis
- Vulnerability Assessment Concept
- Vulnerability Assessment Life-Cycle
- Vulnerability Assessment Solutions
- Vulnerability Scanning Using Nessus
Denial of Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- SYN Flooding Attack using Metasploit, Hping3, LOIC
Malware Threats
- Malware Concept
- Trojan Concept
- Trojan Countermeasures
- Virus and Worms Concepts
- Ransomware
- Virus Generating Tools
System Hacking
- System Hacking
- System Hacking Methodology (Cracking passwords, Escalating privileges, Executing applications, Covering tracks)
- System Hacking Countermeasures
Android Hacking (LAN)
- Mobile Technology Brief
- Hacking Android OS over Local Area Network
- Device Administration API
- Mobile Spyware
- Securing Android Devices
Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques (Human-based and Computer-Based)
SQL Injection
- SQL Injection Concepts
- SQL Injection Methodology
- SQL Injection Tools
Cross-site scripting
- What is cross-site scripting (XSS)
- Reflected cross-site scripting
- Stored cross-site scripting
- DOM-based cross-site scripting
- How to find and test for XSS vulnerabilities
Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Hacking Methodology
Sniffing
- Sniffing Concepts
- Wiretapping
- ARP Poisoning
- ARP Spoofing Attack with Better cap
- Sniffer Detection Technique
IOT Hacking
- Internet of Things (IoT) Concept
- IoT Communication Models
- IoT Attacks
- IoT Hacking Methodology
Cloud Computing
- Introduction to Cloud Computing
- Could Computing Benefits
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
Cyber Law
- What is Cyber Law?
- What happens if you break a cyber law?
- Cyberspace
- Cyber Crimes in India- What is, Types, Web Hijacking, Cyber Stalking
Cryptography and Steganography
- Cryptography Concepts
- Encryption Algorithm
- Advance Encryption Package 2014
- Steganography
- Steganography with Snow Tool and Quick Stego
Duration: 6 months Lecture Schedule: Weekly 3 days / 1 hour session Content :65% Practical : 35% Theory