Module 1 10 hours
Basic knowledge of Networking, Communications (1 hours)
Basic Knowledge of Database (2 hours)
Basics of HTML, JAVASCRIPT, Python, Server-Side Programming (5 hours)
Introduction to Ethical Hacking and cyber crime (1 hour 30 minutes)
Legality and Ethics (30 minutes)
Module 2 15 hours
Foot Printing
Google Hacking
Scanning
Enumeration
System Hacking
Trojans & Backdoors
Virus & Worms
Sniffers
Social Engineering
Proxy Server & Packet Filtering
Denial of Service
Social Engineering
Phishing
Denial of Service Attack
Penetration Testing
Vulnerability Assessment
Physical Security
Cryptography
Steganography
Wireless Network Hacking and Countermeasures
Evading IDS, Firewalls and Detecting Honey Pots
Botnets
Hacking emails
Module 3 15 hours
OWASP top 10 web attacks
Hacking Webservers
Web Application Vulnerabilities
Web Based password Cracking Techniques
SQL Injection Vulnerabilities
Cross Site Scripting (XSS)
Hacking Database Servers
Session Hijacking
Penetration testing on DVWA(simulation of web attack)
Module 4 10 hours
Buffer Overflows
Reverse Engineering
Exploit Writing
Patch Management
Spying Technologies
Creating Security Policies
FAQ
1. What are the eligibility criteria?
Anyone who has cleared class 12 board exam with science or commerce major is
eligible for the course.
For students with Arts Background, you need to have at least 1 year of experience in
Network or Software or system Administration.
If you have any further inquiry regarding the courses and eligibility criteria, we are just a
phone call away.
You are eligible for any course, provided you have the right prerequisite knowledge.
Check answer to question #1 for the study track.
4. Where do I get to know the detailed syllabus and duration of the course?
All our students have been well placed at top MNCs. Though, we do not have any
particular placement cell. We just make our students competent enough, so that they
become the most sought after professionals in the industry. However, if you require, we
may help you in drafting your CV & share with you some details of the companies who
are hiring.
As per Nasscom survey, at this moment, we need 10 lakh security professionals & we
have only 80 thousands. There is acute shortage of skilled workers in this security
sector. There should not be any problem to find the top jobs, if you can learn the right
skills from us.
7. Who are the faculties?
Our faculties are industry professionals who also work for our audit company ISOAH
Data Securities Pvt. Ltd.. They have 10-20 years of individual industry experience. They
are CEH, OSCP, CHFI, CISA, CISSP, ISO 27001 Lead Auditor, etc. Many of our
faculties have experience of working in India & abroad.
We have been invited as speaker / trainer at FICCI, ISACA, Nasscom, STPI, CII, US
High Comm, ICAI, Kolkata Police, CID, CRPF etc.
We have participated in programs on cyber security at India Today, ABP News, ETV
News, Aj Tak, Times Now, etc. Check TV Section.
We have been invited as speaker at IIT-Kharagpur, SRM University, VIT (Vellore) &
almost all colleges in Kolkata.
We are the committee member at Nasscom (East), CII (ICT, Education - East), PRSI
(Kolkata) etc.
If you are from Kolkata, send us an email & we will contact you.
Or
Just come to our office at SDF Building, 2nd Floor, Room 335, Sector-5, Kolkata-91.
Or
Contact your nodal centre.
Indian Govt. does not conduct any such courses that specialize in cyber security
domain.
12. How to make payment for courses? What are the course fees?
Our Representative will inform you once everything is finalized, approximately Rs/-
15,000 per student with a batch of around 20-25 students.
Soft copy, hard copy, penetration testing related software, books in pdf, our research
resources, Whitepapers whenever required.
15. What are the next options available after this course?