Diploma in Cybersecurity
What You will Learn in this Course?
This course consists of 2 Modules each with numerous case studies and 1 assignment. At the end of course there will be a test to check your learning. Diploma Certificate will be awarded to all participants of this program.
Module – I
- Foot printing and reconnaissance
In Footprinting and Reconnaissance lesson you get an idea of what’s involved in the engagement you are working on and information about the targets that you are engaged with.
- Networking Fundamentals
In this lecture we will look into networking fundamentals and here we are going to get our hands dirty with packets, understanding TCP IP at a deeper level and also understanding how different protocols work and why they work.
In the Cryptography lesson you will learn about different cryptographic cyphers you are going to deal with , web encryption, SSL and TLS certificates and creation of certificates and see how they actually operate, then we will learn about public key Cryptography.
- Scanning & Enumeration
In this lesson we are going to deal with scanning & enumeration, NMAP , dealing with windows server using SNMP & LDAP and all of that sort of stuffs
In this lecture you will learn about Penetrations where you get to know different ways of getting into systems and also cover using Metasploit which is an exploit Framework. You will learn how to use metasploit to get into systems and make use of exploits and all that stuff they have available.
- Malware,Virus,Worms, RootKits
In this lecture you will look at different pieces of Malware,Virus, Worms,Rootkits and all of that sort of stuff and pull them apart to understand what it is doing and potentially make use of that malware now during an ethical hacking engagement.
- Denial of Service (DoS)
In this lecture you are going to learn about different types of denial of service attack in the difference between service and distributed denial of service attack.
- Vulnerability Management
We are going to talk about web application hacking and the type of tools that you will be using during web application hacking. The different vulnerabilities the web application have and how to make use of exploit those vulnerabilities
- Wireless Networking
In this lecture we will explore qualities of wireless networks, explore what Wireless networking are doing and how to secure wireless networks.
- Detection Evasion
Detection Evasion comes along with many of the other topics
- Programming Attacks, SQL Injections
In this lecture We are going to learn about programming attacks and how to prevent against programming attacks and injections.
Fundamentals - Footprinting And Reconnaissance
Scanning and Enumeration
Viruses - Trojans
Viruses and Worms
Denial of Service Attacks
Web Application Hacking
Due to COVID19 Pandamic, most of schools,colleges, institutions and universities are closed. This has seriously impacted future of students.Their careers are now at stake. Government has proposed online education as the solution to this issue. So to align with this we have reduced the course fee for all diploma and certification programs. On top of that new students can get flat 10% additional discount using coupon code SKILL20.
PS: Due to sudden surge in students enrollement, For all new enrollment, we are doing additional verification check as per guidance provided by fraud department. It will take 24 hours to make online video lessons come live on your dashboard post verifcation of your account. We appreciate your patience.
New Lessons are added in the curriculum as per the guidelines set by our advisory council.
This Course Curriculum is now updated.
Due to error in code we lost our lesson contents while updating the website. This have impacted some of students who were online. We assure you that our team is working on it .we will be up and running in few hourse. For the time being we have remove the test. Do not worry , all your course progress status data is intact so it will not impact your learning path. We sincerly appreciate your patience.