- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts
- Ethical Hacking Concepts
- Information Security Controls
- Penetration Testing Concepts
- Information Security Laws and Standards
- Home
- Board Infinity
- Courses
- Cyber Security Certification
Cyber Security Certification Course
Get a sheer glance into cybersecurity by joining the online Cyber Security Certification Course by Board Infinity.
Beginner
Online
8 Weeks
$ 15,000 20,000
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Course overview
Cyber Security Certification Course is a certification programme offered in the live online mode by Board Infinity which is an online educational platform that aims at providing online certification on numerous topics, particularly data science & digital marketing. The curriculum of Cyber Security Certification Course Online Training will shed light on Cybersecurity and various related aspects including Ethical Hacking, Malware threats, Cloud Computing and a lot more.
Cyber Security Certification Course Programme, administered by Board Infinity, is aimed at the beginner and intermediate level candidates that will help them to acquire knowledge in the tools and techniques to assess and manage the security in the information processing system. The course is developed and instructed by Sanjeet Mishra who is the founder of Career Technology Cyber Security India. In the course, the students can widen their practical exposure through the practical projects of Google Page Algorithm, SQL Vulnerability Assessment and Password Hacks.
The highlights
- Online course
- Offered by Board Infinity
- Lifetime Access
- Duration of 30 Hours
- Beginners & Intermediate Level Course
- Live Online Mode
- Certification of Completion
Program offerings
- 30 hours of programme
- Certificate of completion
- Best leaders and coaches
- Lifetime access
- Live classes
- On-demand videos
- Case studies
- Assignments
- Projects
Course and certificate fees
Fees information
certificate availability
certificate providing authority
What you will learn
By joining the Cyber Security Certification Course Online Programme, the students will be able to study the concepts of hacking, network scanning, enumeration, system hacking etc. Plus, the learners will explore penetration testing, social engineering, mobile platform attack vectors, mobile device management, mobile pen testing and a lot more.
Who it is for
The syllabus
Week 1-2: Introduction to Ethical Hacking
Week 1-2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting through Search Engines
- Footprinting through Web Services
- Footprinting through Social Networking Sites
- Website,Email, DNS, Network, Whois Footprinting
- Footprinting through Social Engineering
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Pen Testing
Week 1-2: Scanning Networks
- Network Scanning Concepts
- Scanning Tools & Techniques
- Scanning Beyond IDS and Firewall
- Banner Grabbing
- Draw Network Diagrams
- Scanning Pen Testing
Week 1-2: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP, LDAP, NTP Enumeration
- DNS Enumeration
- Other Enumeration Techniques
- Enumeration Countermeasures
- Enumeration Pen Testing
Week 3-4: Vulnerability Analysis
- Vulnerability Assessment Concepts & Solutions
- Vulnerability Scoring Systems
- Vulnerability Assessment Tools & Reports
Week 3-4: Installation & Configuration of Hadoop
- System Hacking Concepts
- Cracking Passwords
- Escalating Privileges
- Executing Applications
- Hiding Files
- Covering Tracks
- Penetration Testing
Week 3-4: Malware Threats
- Malware & Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis
- Anti-Malware Software
- Malware Penetration Testing
Week 3-4: Sniffing
- Sniffing Concepts
- Sniffing Technique: MAC & DHCP Attacks
- Sniffing Technique: ARP & DNS Poisoning
- Sniffing Technique: Spoofing Attacks
- Sniffing Tools
- Countermeasures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Week 5-6: Social Engineering
- Social Engineering Concepts & Techniques
- Insider Threats
- Impersonation on Social Networking Sites
- Identity Theft
- Countermeasures
- Social Engineering Pen Testing
Week 5-6: Denial-Of-Service
- DoS/DDoS Concepts & Techniques
- Botnets
- DoS/DDoS Attack Tools
- Countermeasures
- DoS/DDoS Protection Tools & Penetration Testing
Week 5-6: Session Hijacking
- Session Hijacking Concepts
- Application Level & Network Level Session Hijacking
- Session Hijacking Tools
- Countermeasures
- Penetration Testing
Week 5-6: Evading IDs, Firewalls and Honeypots
- IDS, Firewall and Honeypot Concepts & Solutions
- Evading IDS & Firewalls
- Detecting Honeypots
- IDS/Firewall Evasion Countermeasures
- Penetration Testing
Week 7-8: Hacking Web Servers
- Web Server Concepts
- Web Server Attack Methodology & Tools
- Patch Management
- Web Server Security Tools
- Web Server Pen Testing
Week 7-8: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Hacking Methodology
- Web App Hacking Tools
- Countermeasures
- Web App Security Testing Tools
- Web App Pen Testings
Week 7-8: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Countermeasures
Week 7-8: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Countermeasures
- Wireless Security Tools
- Wireless Pen Testing
Week 7-8: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Mobile Spyware
- Mobile Device Management
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
Week 7-8: Cloud Computing
- Cloud Computing Concepts
- Cloud Computing Threats & Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
- Module - 19: Cryptography
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure (PKI)
- Email Encryption
- Disk Encryption
- Cryptanalysis
Instructors
Mr Sanjeet Mishra
Instructor
Board Infinity
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to the Threat Intelligence Lifecycle
IBM via Coursera
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Introduction to Cybersecurity for Business
CU Boulder via Coursera
Courses of your interest
An Introduction To Coding Theory
IIT Kanpur via Swayam
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by Board Infinity
Express Bootcamp for Front End Development
Board Infinity
Express Bootcamp for Performance Marketing
Board Infinity
Personal Finance and Investment Planning
Board Infinity
Product Management
Board Infinity
Full Stack Development Bootcamp
Board Infinity
Android Development for Beginners
Board Infinity
Angular JS
Board Infinity
Grooming and Etiquette Training
Board Infinity
HR and Functional Interview Preparation
Board Infinity
Interview Preparation Bootcamp
Board Infinity