+91 9702570087

Diploma in Computer Application(DCA)

Diploma In Ethical Hacking

Introduction to Computer Security & Ethical Hacking

  • Types of Hackers
  • Ethical Hacking Importance, Scope & Limitations
  • Skills of Ethical Hacker

Networking

  • Basics of Ip
  • Types of Ip's
  • IANA / Allotment of Ip's
  • Domains
  • Ping and Ping Sweep

Footprinting and Reconnaissance

a. Footprinting Concepts

b. Types of Footprinting

  • Footprinting through Search Engines
  • Footprinting through Websites
  • Footprinting through Email
  • Footprinting through Network

Lab Preparation (Installing Multiple OS)

  • Virtualization Technology
  • Downloading & Installing Virtual Box
  • Downloading & Installation of Operating Systems (Parrot Sec OS, Windows 10,Windows Server 2016, Windows 7, Metasploitable, Android)

Scanning Networks

  • Need for Network Scanning
  • Scanning Methodologies
  • Proxy Servers
  • Proxy Tools

Enumeration

  • Significance of Enumeration
  • Enumeration Concepts
  • Enumeration Using Nmap
  • Enumeration Using Super Scan Tool
  • Enumeration Countermeasures

Vulnerability Analysis

  • Vulnerability Assessment Concept
  • Vulnerability Assessment Life-Cycle
  • Vulnerability Assessment Solutions
  • Vulnerability Scanning Using Nessus

Denial of Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • SYN Flooding Attack using Metasploit, Hping3, LOIC

Malware Threats

  • Malware Concept
  • Trojan Concept
  • Trojan Countermeasures
  • Virus and Worms Concepts
  • Ransomware
  • Virus Generating Tools

System Hacking

  • System Hacking
  • System Hacking Methodology (Cracking passwords, Escalating privileges, Executing applications, Covering tracks)
  • System Hacking Countermeasures

Android Hacking (LAN)

  • Mobile Technology Brief
  • Hacking Android OS over Local Area Network
  • Device Administration API
  • Mobile Spyware
  • Securing Android Devices

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques (Human-based and Computer-Based)

SQL Injection

  • SQL Injection Concepts
  • SQL Injection Methodology
  • SQL Injection Tools

Cross-site scripting

  • What is cross-site scripting (XSS)
  • Reflected cross-site scripting
  • Stored cross-site scripting
  • DOM-based cross-site scripting
  • How to find and test for XSS vulnerabilities

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Hacking Methodology

Sniffing

  • Sniffing Concepts
  • Wiretapping
  • ARP Poisoning
  • ARP Spoofing Attack with Better cap
  • Sniffer Detection Technique

IOT Hacking

  • Internet of Things (IoT) Concept
  • IoT Communication Models
  • IoT Attacks
  • IoT Hacking Methodology

Cloud Computing

  • Introduction to Cloud Computing
  • Could Computing Benefits
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security

Cyber Law

  • What is Cyber Law?
  • What happens if you break a cyber law?
  • Cyberspace
  • Cyber Crimes in India- What is, Types, Web Hijacking, Cyber Stalking

Cryptography and Steganography

  • Cryptography Concepts
  • Encryption Algorithm
  • Advance Encryption Package 2014
  • Steganography
  • Steganography with Snow Tool and Quick Stego

Duration: 6 months Lecture Schedule: Weekly 3 days / 1 hour session Content :65% Practical : 35% Theory

If you Have Any Questions Call Us On +91 970 257 0087