Overview

In this course, Which maps to the cloud computing module in version 10 of the certified module in version 10 of the Certified Ethical Hacker (CEH) exam, instructor Daniel Lachance explores how to evaluate and harden Cloud-deployed.

Ethical Hacking involves a hacker agreeing with an organization or individual

Cyber Security is sub-stream of Computer Science, which provides knowledge and skills required for computer operating systems, networks, and data from cyber-attacks.

It is a Graduate course that involves the study of computer science with respect to programming, operating systems, Linux, cryptography, ethical hacking and mobile, and wireless security. Candidates are taught about practical topics like operations, software design, implementation, storage, security, and multiple encryption and hacking methodologies during the course. Tools like IaaS and SaaS are also highlighted in the course. Skills like management, leadership, research, and decision-making are enhanced through the course.

 Job opportunities

  • Borderless Access
  • CGI
  • Linked in
  • Google
  • Fact set
  • Google
  • Dell, Etc

Syllabus

Ethical Hacking Course Syllabus

The syllabus for Ethical Hacking varies for different courses. Some of the common topics that most Ethical Hacking Courses cover are as given below in the table.

Cyber Ethics-Hacking Introduction Information Gathering
Scanning Google Hacking Database
Virus, Worms - Virus Analysis Trojans and Backdoors
Sniffers and keyloggers Social Engineering
Email, DNS, IP spoofing System Hacking and Security
HoneyPots -

 

Certified Ethical Hacker Course Syllabus

Certified Ethical Hacker Course is a course by Ec-Council and is recognised globally. Their modules are designed for providing a comprehensive ethical hacking and penetration testing training and covers various topics. Here is a list of topics that are covered in the Certified Ethical Hacker Course.

Introduction to Ethical Hacking Footprinting and Reconnaissance
Scanning Networks Enumeration
System Hacking Malware Threats
Sniffing Social Engineering
Denial of Service Session Hijacking
Hacking Web Servers Hacking Web Applications
SQL Injection Hacking Wireless Networks
Hacking Mobile Platforms Evading IDS, Firewalls and Honeypot
Cloud Computing Cryptography

 

CEH v11 Syllabus

CEH v11 has a total of 20 modules. The topics may differ from other versions. The modules of CEH v11 course are given below in the table.

Modules Topics
1 Introduction to Ethical Hacking
2 Footprinting and Reconnaissance
3 Scanning Networks
4 Enumeration
5 Vulnerability Analysis
6 System Hacking
7 Malware Threats
8 Sniffing
9 Social Engineering
10 Denial-of-Service
11 Session Hijacking
12 Evading IDS, Firewalls, and Honeypots
13 Hacking Web Servers
14 Hacking Web Applications
15 SQL Injection
16 Hacking Wireless Networks
17 Hacking Mobile Platforms
18 IoT and OT Hacking
19 Cloud Computing
20 Cryptography

Hacking Course Syllabus

Hacking Course covers Ethical Hacking, Website Hacking and Security and Mobile and Wireless security in general. Given below in the table is a list of topics that are covered in the above-mentioned.

Ethical Hacking
Information Gathering Cyber Ethics
Hacking Introduction Trojans and Backdoors
Sniffers and keyloggers Google Hacking Database
Virus and Virus Analysis Email, DNS, IP spoofing
HoneyPots Social Engineering
System Hacking and Security -
Website Hacking And Security
SQL Injection XSS Attacks and Countermeasures
LFI/ RFI Attacks and Countermeasures Vulnerability Research
Vulnerability Assessment and Penetration Testing Exploit Writing
Information Disclosure Vulnerabilities Buffer Overflow and Session Hijacking Attacks
Secure Coding Practices -
Mobile And Wireless Security
SMS Forging and Countermeasures Wireless Hacking and Security
VoIP Hacking and Countermeasures -

Cyber Security and Ethical Hacking Course Syllabus

Cyber Security and Ethical Hacking Course covers various areas related to Ethical Hacking such as cloud computing, Introduction to Ethical Hacking, Denial of Service, Hacking Mobile Platforms, Social Engineering and more. The table below consists of the list of topics that are covered in various Cyber Security and Ethical Hacking Courses.

Cloud Computing Introduction to Ethical Hacking
Denial of Service Hacking Mobile Platforms
Cryptography Hacking Web Servers
Session Hijacking Scanning Networks
Social Engineering Malware Threats
Footprinting and Reconnaissance SQL Injection
Evading IDS, Firewalls and Honeypots Enumeration

FEATURE COLLEGES

REVA UNIVERSITY

Bengaluru, Karnataka

4.5

Student Review About Course

Add a review

Related Blogs