SCSE Course Outline

  • Overview of Current Security Trends.
  • Understanding the elements of Information Security.
  • Understanding Information Security threats and attack vectors.
  • Overview of Hacking concepts types and phases.
  • Understanding Ethical Hacking concepts and scope.
  • Overview of Information Security controls.
  • Overview Penetration Testing.
  • Overview Information Security Acts and Laws.
  • Understanding Footprinting Concepts.
  • Footprinting through search engines and advance google hacking techniques
  • Footprinting through web services and social networking sites.
  • Understanding Website Footprinting, Email Footprinting, and Competitive Intelligence.
  • Understanding WHOIS, DNS, and Network Footprinting.
  • Footprinting through social engineering.
  • Understanding different Footprinting Tools and Countermeasures.
  • Understanding Footprinting Penetration testing.
  • Understanding Network Scanning concepts.
  • Understanding various scanning tools.
  • Understanding various scanning techniques .
  • Understanding various  techniques to scan beyond IDS and Firewall.
  • Understanding Banner Grabbing.
  • Drawing Network Diagram.
  • Overview of Scanning Pen testing.
  • Understanding Enumeration concepts.
  • Understanding different techniques for NETBIOS Enumeration.
  • Understanding different  techniques for SNMP Enumeration.
  • Understanding different techniques LDAP and NTP Enumeration.
  • Understanding different techniques for SMTP and DNS Enumeration.
  • Understanding other Enumerations such as IPsec, VoIP, RPC, and Linux/Unix Enumeration.
  • Understanding different Enumeration countermeasures.
  • Overview of Enumeration PenTesting.
  • Overview of vulnerability research and vulnerability classification.
  • Overview of vulnerability assessment. 
  • Overview of vulnerability management lifecycle (Assessment Phases).
  • Understanding different approaches of vulnerability assessment solutions.
  • Understanding of different types of vulnerability assessment tools.
  • Overview of vulnerability scoring systems.
  • Vulnerability assessment tools.
  • Overview of vulnerability assessment reports.
  • Overview of CEH Hacking Methodology.
  • Understanding techniques to gain access to the System.
  • Understanding Privilege escalation techniques.
  • Understanding techniques to create and maintain remote access to the System
  • Overview of different types of Rootkits.
  • Overview of Steganography Steganalysis Techniques. 
  • Understanding techniques to hide the evidence of compromise.
  • Overview of system Hacking Penetration testing.
  • Understanding Malware and Malware Propagation Techniques. 
  • Overview of Torjans, their types and how they infect the system.
  •  Overview of viruses, their types and how they Infect files.
  • Overview of Computer worms.
  • Understanding the Malware analysis process.
  • Understanding different techniques to detect malware.
  • Understanding different Malware countermeasures.
  • Understand Malware penetration testing.
  • Overview of Sniffing concepts.
  • Understanding various Sniffing techniques.
  • Understanding how to defend against various Sniffing techniques.
  • Overview of various Sniffing tools
  • Understanding different Sniffing countermeasures.
  • Understanding different techniques to detect Sniffing.
  • Overview of Sniffing penetration testing.
  • Overview of DOS and DDOS attacks.
  • Understanding different DoS/DDoS attack techniques.
  • Understanding the Botnet Network.
  • Understanding Various DoS and DDoS attack tools.
  • Understanding different techniques to detect DoS and DDoS attacks.
  • Understanding different DoS/DDoS countermeasures.
  • Overview of DoS attack penetration testing.
  • Understanding of Session Hijacking concepts.
  • Understanding application level session Hijacking.
  • Understanding Network level session hijacking 
  • Overview of session hijacking tools.
  • Understanding different session hijacking countermeasures.
  • Overview of session hijacking penetration testing.
  • Understanding IDS, Firewall, and Honeypot concepts.
  • IDS, Firewall and Honeypot Solutions.
  • Understanding different techniques to Bypass IDS.
  • Understanding different techniques to Bypass Firewalls.
  • IDS/Firewall Evading tools.
  • Understanding different techniques to detect Honeypot.
  • IDS/Firewall evasion countermeasures
  • Overview of IDS and Firewall penetration testing.
  • Understanding web server concepts.
  • Understanding web server attacks.
  • Understanding web server attack methodology.
  • Overview of web server attack tools.
  • Understanding different web server attack countermeasures.
  • Understanding Patch management concepts.
  • Overview of web server security tools.
  • Overview of web server penetration testing. 
  • Understanding web application concepts.
  • Understanding Web application threats.
  • Understanding Web application hacking methodologies.
  • Overview of Web application hacking tools.
  • Understanding different web application attacks’s countermeasures.
  • Overview of web application security testing tools.
  • Overview of web application penetration testing.
  • Understanding SQL Injection concepts.
  • Understanding of various types of SQL Injection attacks.
  • Understanding SQL injections methodology.
  • Understanding various SQL Injections tools.
  • Understanding different IDS Evasion Techniques.
  • Overview of SQL Injection countermeasures.
  • Overview of various SQL injection detection tools.
  • Overview of wireless concepts.
  • Overview of wireless encryption algorithms.
  • Understanding wireless threats.
  •  Understanding wireless hacking methodology.
  • Overview of different wireless hacking tools.
  • Understanding Bluetooth hacking techniques.
  • Overview of wireless hacking countermeasures and security tools.
  • Overview of wireless penetration testing.
  • Understanding Mobile platform attack vector .
  • Understanding Various android threats and attacks. 
  • Understanding Various Ios threats and attacks. 
  • Understanding various mobile spyware.
  • Understanding mobile device management (MDM).
  • Mobile Security guidelines and security tools.
  • Overview of mobile penetration testing.
  • Understanding IoT concepts. 
  • Overview of IoT threats and attacks.
  • Understanding IoT hacking methodology.
  •  IoT hacking tools.
  • IoT hacking countermeasures.
  • IoT security tools.
  • Overview of IoT penetration testing.
  • Understanding Cloud Computing concepts.
  • Understanding Cloud Computing  threats.
  • Understanding Cloud Computing attacks.
  • Understanding Cloud Computing security.
  • Cloud Computing security tools.
  • Overview of cloud penetration testing.
  • Understanding Cryptography concepts.
  • Overview of encryption algorithms.
  • Cryptography tools.
  • Understanding Public Key Infrastructure (PKI).
  • Understanding Email encryption.
  • Understanding Disk encryption.
  • Understanding cryptography attacks.
  • Cryptanalysis Tools.

Join Our Happy Students​ Today!

Check our Student's Success before joining US

Sherdil believes in “Think, Learn and Earn”
Copyright © 2020 Sherdil IT Academy
Close Bitnami banner
Bitnami