- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Penetration Testing Concepts
- Information Security Laws and Standards
Cyber Security Certification Course
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Course overview
Cyber Security Certification Course is a certification programme offered in the live online mode by Board Infinity which is an online educational platform that aims at providing online certification on numerous topics, particularly data science & digital marketing. The curriculum of Cyber Security Certification Course Online Training will shed light on Cybersecurity and various related aspects including Ethical Hacking, Malware threats, Cloud Computing and a lot more.
Cyber Security Certification Course Programme, administered by Board Infinity, is aimed at the beginner and intermediate level candidates that will help them to acquire knowledge in the tools and techniques to assess and manage the security in the information processing system. The course is developed and instructed by Sanjeet Mishra who is the founder of Career Technology Cyber Security India. In the course, the students can widen their practical exposure through the practical projects of Google Page Algorithm, SQL Vulnerability Assessment and Password Hacks.
The highlights
- Online course
- Offered by Board Infinity
- Lifetime Access
- Duration of 30 Hours
- Beginners & Intermediate Level Course
- Live Online Mode
- Certification of Completion
Program offerings
- 30 hours of programme
- Certificate of completion
- Best leaders and coaches
- Lifetime access
- Live classes
- On-demand videos
- Case studies
- Assignments
- Projects
Course and certificate fees
certificate availability
Yes
certificate providing authority
Board Infinity
Who it is for
What you will learn
By joining the Cyber Security Certification Course Online Programme, the students will be able to study the concepts of hacking, network scanning, enumeration, system hacking etc. Plus, the learners will explore penetration testing, social engineering, mobile platform attack vectors, mobile device management, mobile pen testing and a lot more.
The syllabus
Introduction to Ethical Hacking
Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website,Email, DNS, Network, Whois Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Pen Testing
Scanning Networks
- Network Scanning Concepts
- Scanning Tools & Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
- Scanning Pen Testing
Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP, LDAP, NTP Enumeration
- DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Enumeration Pen Testing
Vulnerability Analysis
- Vulnerability Assessment Concepts & Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools & Reports
Installation & Configuration of Hadoop
- System Hacking Concepts
- Cracking Passwords
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Penetration Testing
Malware Threats
- Malware & Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis
- Anti-Malware Software
- Malware Penetration Testing
Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC & DHCP Attacks
- Sniffing Technique: ARP & DNS Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Tools
- Countermeasures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Social Engineering
- Social Engineering Concepts & Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Countermeasures
- Social Engineering Pen Testing
Denial-Of-Service
- DoS/DDoS Concepts & Techniques
- Botnets
- DoS/DDoS Attack Tools
- Countermeasures
- DoS/DDoS Protection Tools & Penetration Testing
Session Hijacking
- Session Hijacking Concepts
- Application Level & Network Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
- Penetration Testing
Evading IDs, Firewalls and Honeypots
- IDS, Firewall and Honeypot Concepts & Solutions
- Evading IDS & Firewalls
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
- Penetration Testing
Hacking Web Servers
- Web Server Concepts
- Web Server Attack Methodology & Tools
- Patch Management
- Web Server Security Tools
- Web Server Pen Testing
Hacking Web Applications
- Web App Concepts
- Web App Threats
- Hacking Methodology
- Web App Hacking Tools
- Countermeasures
- Web App Security Testing Tools
- Web App Pen Testings
SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Countermeasures
Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Countermeasures
- Wireless Security Tools
- Wireless Pen Testing
Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Spyware
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
Cloud Computing
- Cloud Computing Concepts
- Cloud Computing Threats & Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
- Module - 19: Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
Instructors
Articles
Popular Articles
Latest Articles
Similar Courses


Microsoft Future Ready Fundamentals of Enterprise ...
CloudSwyft Global Systems, Inc via Futurelearn


Threat Intelligence Lifecycle Fundamentals
IBM via Edx

Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx


Introduction to the Threat Intelligence Lifecycle
IBM via Coursera


Introduction to Cybersecurity Essentials
IBM via Coursera

Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera


Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx

Information Security for Beginners
EC-Council via Futurelearn


Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera


Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Courses of your Interest

An Introduction To Coding Theory
IIT Kanpur via Swayam
C++ Foundation
PW Skills
Advanced CFD Meshing using ANSA
Skill Lync
Data Science Foundations to Core Bootcamp
Springboard

User Experience Design And Research
UM–Ann Arbor via Futurelearn

Fundamentals of Agile Project Management
UCI Irvine via Futurelearn

Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
More Courses by Board Infinity

Express Bootcamp for Content Marketing
Board Infinity

Become a Front End React Developer
Board Infinity

Express Bootcamp for Performance Marketing
Board Infinity

Personal Finance and Investment Planning
Board Infinity

Product Management
Board Infinity

Full Stack Development Bootcamp
Board Infinity

Android Development for Beginners
Board Infinity

Angular JS
Board Infinity

Grooming and Etiquette Training
Board Infinity

HR and Functional Interview Preparation
Board Infinity