SCSE Course Outline
- Overview of Current Security Trends.
- Understanding the elements of Information Security.
- Understanding Information Security threats and attack vectors.
- Overview of Hacking concepts types and phases.
- Understanding Ethical Hacking concepts and scope.
- Overview of Information Security controls.
- Overview Penetration Testing.
- Overview Information Security Acts and Laws.
- Understanding Footprinting Concepts.
- Footprinting through search engines and advance google hacking techniques
- Footprinting through web services and social networking sites.
- Understanding Website Footprinting, Email Footprinting, and Competitive Intelligence.
- Understanding WHOIS, DNS, and Network Footprinting.
- Footprinting through social engineering.
- Understanding different Footprinting Tools and Countermeasures.
- Understanding Footprinting Penetration testing.
- Understanding Network Scanning concepts.
- Understanding various scanning tools.
- Understanding various scanning techniques .
- Understanding various techniques to scan beyond IDS and Firewall.
- Understanding Banner Grabbing.
- Drawing Network Diagram.
- Overview of Scanning Pen testing.
- Understanding Enumeration concepts.
- Understanding different techniques for NETBIOS Enumeration.
- Understanding different techniques for SNMP Enumeration.
- Understanding different techniques LDAP and NTP Enumeration.
- Understanding different techniques for SMTP and DNS Enumeration.
- Understanding other Enumerations such as IPsec, VoIP, RPC, and Linux/Unix Enumeration.
- Understanding different Enumeration countermeasures.
- Overview of Enumeration PenTesting.
- Overview of vulnerability research and vulnerability classification.
- Overview of vulnerability assessment.
- Overview of vulnerability management lifecycle (Assessment Phases).
- Understanding different approaches of vulnerability assessment solutions.
- Understanding of different types of vulnerability assessment tools.
- Overview of vulnerability scoring systems.
- Vulnerability assessment tools.
- Overview of vulnerability assessment reports.
- Overview of CEH Hacking Methodology.
- Understanding techniques to gain access to the System.
- Understanding Privilege escalation techniques.
- Understanding techniques to create and maintain remote access to the System
- Overview of different types of Rootkits.
- Overview of Steganography Steganalysis Techniques.
- Understanding techniques to hide the evidence of compromise.
- Overview of system Hacking Penetration testing.
- Understanding Malware and Malware Propagation Techniques.
- Overview of Torjans, their types and how they infect the system.
- Overview of viruses, their types and how they Infect files.
- Overview of Computer worms.
- Understanding the Malware analysis process.
- Understanding different techniques to detect malware.
- Understanding different Malware countermeasures.
- Understand Malware penetration testing.
- Overview of Sniffing concepts.
- Understanding various Sniffing techniques.
- Understanding how to defend against various Sniffing techniques.
- Overview of various Sniffing tools
- Understanding different Sniffing countermeasures.
- Understanding different techniques to detect Sniffing.
- Overview of Sniffing penetration testing.
- Overview of DOS and DDOS attacks.
- Understanding different DoS/DDoS attack techniques.
- Understanding the Botnet Network.
- Understanding Various DoS and DDoS attack tools.
- Understanding different techniques to detect DoS and DDoS attacks.
- Understanding different DoS/DDoS countermeasures.
- Overview of DoS attack penetration testing.
- Understanding of Session Hijacking concepts.
- Understanding application level session Hijacking.
- Understanding Network level session hijacking
- Overview of session hijacking tools.
- Understanding different session hijacking countermeasures.
- Overview of session hijacking penetration testing.
- Understanding IDS, Firewall, and Honeypot concepts.
- IDS, Firewall and Honeypot Solutions.
- Understanding different techniques to Bypass IDS.
- Understanding different techniques to Bypass Firewalls.
- IDS/Firewall Evading tools.
- Understanding different techniques to detect Honeypot.
- IDS/Firewall evasion countermeasures
- Overview of IDS and Firewall penetration testing.
- Understanding web server concepts.
- Understanding web server attacks.
- Understanding web server attack methodology.
- Overview of web server attack tools.
- Understanding different web server attack countermeasures.
- Understanding Patch management concepts.
- Overview of web server security tools.
- Overview of web server penetration testing.
- Understanding web application concepts.
- Understanding Web application threats.
- Understanding Web application hacking methodologies.
- Overview of Web application hacking tools.
- Understanding different web application attacks’s countermeasures.
- Overview of web application security testing tools.
- Overview of web application penetration testing.
- Understanding SQL Injection concepts.
- Understanding of various types of SQL Injection attacks.
- Understanding SQL injections methodology.
- Understanding various SQL Injections tools.
- Understanding different IDS Evasion Techniques.
- Overview of SQL Injection countermeasures.
- Overview of various SQL injection detection tools.
- Overview of wireless concepts.
- Overview of wireless encryption algorithms.
- Understanding wireless threats.
- Understanding wireless hacking methodology.
- Overview of different wireless hacking tools.
- Understanding Bluetooth hacking techniques.
- Overview of wireless hacking countermeasures and security tools.
- Overview of wireless penetration testing.
- Understanding Mobile platform attack vector .
- Understanding Various android threats and attacks.
- Understanding Various Ios threats and attacks.
- Understanding various mobile spyware.
- Understanding mobile device management (MDM).
- Mobile Security guidelines and security tools.
- Overview of mobile penetration testing.
- Understanding IoT concepts.
- Overview of IoT threats and attacks.
- Understanding IoT hacking methodology.
- IoT hacking tools.
- IoT hacking countermeasures.
- IoT security tools.
- Overview of IoT penetration testing.
- Understanding Cloud Computing concepts.
- Understanding Cloud Computing threats.
- Understanding Cloud Computing attacks.
- Understanding Cloud Computing security.
- Cloud Computing security tools.
- Overview of cloud penetration testing.
- Understanding Cryptography concepts.
- Overview of encryption algorithms.
- Cryptography tools.
- Understanding Public Key Infrastructure (PKI).
- Understanding Email encryption.
- Understanding Disk encryption.
- Understanding cryptography attacks.
- Cryptanalysis Tools.
Join Our Happy Students Today!
Check our Student's Success before joining US
Copyright © 2020 Sherdil IT Academy