CYBER SECURITY CERTIFICATION COURSE

Course Description

The Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations. Enroll in this Cyber Security certification training program to learn from experienced industry professionals, work on real-time projects and become a certified expert.

Learn more

HACK YOUR

#FUTURE

Build cybersecurity skills to accelerate your career

COURSE STARTS IN

:
:
:
Days
Hours
Minutes
Seconds
Countdown finished!

Contact Us

Cyber Security Course Curriculum

Got a question? We’re here to help.
  • Introduction to Cyber security & Ethical Hacking

    Learning Objective: In this Cyber security training online module, you will learn about the essential building blocks and basic concepts around cybersecurity such as Confidentiality, Integrity, Availability, Security Architecture, Security Policies, and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture.  


    Topics:

    • Need of Cybersecurity
    • CIA Triad
    • Security Architecture
    • Security Governance
    • Security Auditing
    • Regulations & Frameworks
    • Ethical Hacking
    • Types of Hackers
    • Phases of Ethical Hacking
    • Penetration Testing
    • Types of Penetration Testing
    • Footprinting
    • Objectives of Footprinting
    • Types of Footprinting
    • Footprinting Techniques

    Hands-On/Demo:

    • Footprinting a website using Whois Lookup, netcraft, and shodan
    • Gathering information about Domain through Reon-ng Tool in Kali Linux
    • Gathering information about Domain through Maltego Tool
    • Gathering information about Sub-domain through Sublist3r and dnsmap tool in Kali linux
    • Email Footprinting using eMail Tracker Pro
    • DNS Footprinting using DNS Interrogation Tools
  • Cryptography

    Learning Objective: In this cyber security courses online module, you will learn various forms of cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods, and its usage are employed in the enterprise to store and transmit messages safely.


    Topics:

    • Types of cryptography
    • Symmetric cryptography
    • Asymmetric cryptography
    • Hash functions
    • Digital signatures
    • Public Key Infrastructure (PKI)
    • Attacks on cryptosystems

    Hands-On/Demo:

    • Generating and identifying hashes
    • Signing a file with digital signatures
  • Computer Networks & Security

    Learning Objective: In this cyber security learning module, you will glance over various aspects related to computer networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks.



    Topics:


    Followings are the topics you will be having in this Cyber security course program:


    • Introduction to Computer Network
    • Computer Networks - Architecture 
    • Layered architecture
    • Open Systems Interconnect (OSI) Model
    • Transmission Control Protocol/Internet Protocol (TCP/IP) 
    • Network Scanning
    • Enumeration
    • Common Network Threats/Attacks

    Hands-On/Demo:

    • Identify the Network Routes in the System
    • DNS lookup and reverse lookup
    • Network Path tracing
    • Network Analysis 
    • Network scanning 
    • Enumeration
  • Application and Web Security

    Learning Objective: We offer the best cyber security courses online so that you can learn the importance of Application-level security. You will also explore various known application weaknesses, techniques to attack them, and various controls/solutions to these vulnerabilities. You will also get an overview of countermeasures that can be employed to protect from different threats.



    Topics:

    • Web server architecture
    • Web server attacks
    • Countermeasures and patch management
    • Web application architecture
    • Web application attacks

    Hands-On/Demo:

    • Capturing session ID with Burp Suite
    • Local File Inclusion on bWAPP
  • IdAM (Identity and Access Management)

    Learning Objective: In Edureka's best cyber security certification course module, you will learn about the aspects related to the principle of Identity & Access Management. This module covers various intricacies around concepts of authorization, authentication, identity & access management, and its benefits to an enterprise.


    Topics:

    • Authentication and authorization
    • Authentication and authorization principles
    • Regulation of access
    • Access administration
    • IdAM
    • Password protection 
    • Identity theft

    Hands-On/Demo:

    • Adding and granting permissions to users in Linux
    • Identifying phishing websites
  • Vulnerability Analysis & System Hacking

    Learning Objective: In this cyber security certification course module you will learn how to analyze a system for various vulnerabilities. You will also learn various strategies and methodologies to gain access to the system.


    Topics:

    The following topics you will be having in this cybersecurity course module:


    • Vulnerability Analysis
    • Types of Vulnerability Analysis
    • Vulnerability Assessment Lifecycle
    • Vulnerability Assessment Tools
    • Vulnerability Scoring Systems
    • Vulnerability Assessments Report
    • System Hacking
    • Password Cracking
    • Privilege escalation
    • Executing Applications
    • Hiding Files
    • Clearing Logs

    Hands-On/Demo:

    • Find the vulnerabilities of the host/website using the Nessus tool
    • Find the vulnerabilites on target website/ host using Nikto scanner
    • Password Breaking – Ophcrack
    • Password Breaking  - Konboot Tool
    • Install keyloggers and configure the victim PC to monitor the system on keystrokes and screenshots
  • Sniffing and SQL Injection

    Learning Objective: In Edureka's best cyber security courses online module, you will learn the concept of malwares, its propagation techniques, its types, concept of sniffing, types of sniffing attacks, SQL injection & its types, and SQL injection methodologies.



    Topics:

    • Malware and its propagation ways
    • Malware components
    • Types of malware
    • Concept of sniffing
    • Types of sniffing
    • Types of sniffing attacks
    • SQL injection
    • Types of SQL injection
    • SQL injection Methodologies

    Hands-On/Demo:

    • Create a trojan by using msfvenom
    • Sniff network packets Using Wireshark
    • MAC Flooding Using macof
    • DHCP attack using Yersinia
    • Bypass Authentication using SQL Injection
    • Determine how the hackers may get the database of a website and steal the credentials of users from website vulnerability
  • DoS and Session Hijacking

    Learning Objective:  In this Cybersecurity training online module, you will gain an overview of DoS and DDoS attacks, session hijacking and its types, working of the intrusion detection system, and the concept of honeypots. 


    Topics:


    Followings are the topics you will be having in this Cyber security course program:


    • DoS attack
    • DDoS attack
    • Common symptoms of DoS/DDoS attack
    • Categories of DoS/DDoS Attack Vectors
    • DoS/DDoS detection techniques
    • Session hijacking
    • Application level session hijacking
    • Network level session hijacking
    • Intrusion Detection System (IDS)
    • Types of Intrusion Detection Systems
    • Introduction to Firewalls
    • Types of Firewalls
    • Introduction to Honeypots
    • Evading IDS

    Hands-On/Demo:

    • DoS Attack using LOIC Tool 
    • Cross-site Scripting attack
    • Demonstration on cookie stealing

FAQS

Here are answers to some common questions. 

  • What is the Course fee?

    Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.
  • Can I get a full refund?

    Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.
  • What is the delivery method?

    Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.
  • What is the training schedule?

    Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.
  • Are the instructors well trained?

    Describe the item or answer the question so that site visitors who are interested get more information. You can emphasize this text with bullets, italics or bold, and add links.

Talk to us today!

Our clients have so many great things to say.

With over ten years in the business, we know what you need to have the best possible experience.

“Your platform is so easy to use. Thank you!”

Michel D

“Your platform is so easy to use. Thank you!”

Michel D

“Your platform is so easy to use. Thank you!”

Michel D

Join the community

Over 500 staff of reputable organizations have taken this course