EC-Council
Plus Two / Diploma / Any Graduation
1 year
Online/Offline/E-learning
1.. Introduction to Ethical Hacking
2. Foot printing and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS
13. Firewalls and Honeypots
14. Hacking Web Servers
15. Hacking Web Applications
16. SQL Injection
17. Hacking Wireless Networks
18. Hacking Mobile Platforms
19. IoT and OT Hacking
20. Cloud Computing
21. Cryptography
22. Introduction to Penetration Testing
23. Penetration Testing Scoping and Engagement
24. Open Source Intelligence (OSINT)
25. Social Engineering Penetration Testing
26. Network Penetration Testing External
27. Network Penetration Testing Internal
28. Network Penetration Testing – Perimeter Devices
29. Web Application Penetration Testing
30. Wireless Penetration Testing
31. Wireless Penetration Testing
32. IoT Penetration Testing
33. OT/SCADA Penetration Testing
34. Cloud Penetration Testing
35. Binary Analysis and Exploitation
36. Report Writing and Post Testing Actions
37. Forensic Computer Analyst
38. Computer Forensics Criminal Investigator
39. Intelligence Technology Analyst
40. Disaster Recovery Expert
41. Cryptographer
42. Crypt analyst
43. Computer Crime Investigator
44. Mobile Forensics Expert
45. Information Technology Auditor
46. Digital Crime Specialist
47. Cyber Defense Forensic Analyst
48. Forensic Analyst
49. Cyber Crime Investigator
50. Information System Security Professional
51. Forensics Accountant
52. Information Security Analyst
53. Malware Analyst
54. Computer Forensics Examiner
55. Security Consultant
56. Computer Forensics Technician
57. Network Attacks and Defense Strategies
58. Administrative Network Security
59. Technical Network Security
60. Network Perimeter Security
61. Endpoint Security- Windows Systems
62. Endpoint Security- Linux Systems
63. Endpoint Security- Mobile Devices
64. Endpoint Security-IoT Devices
65. Administrative Application Security
66. Data Security
67. Enterprise Virtual Network Security
68. Enterprise Cloud Network Security
69. Enterprise Wireless Network Security
70. Network Traffic Monitoring and Analysis
71. Network Logs Monitoring and Analysis
72. Incident Response and Forensic Investigation
73. Business Continuity and Disaster Recovery
74. Risk Anticipation with Risk Management
75. Threat Assessment with Attack Surface Analysis
76. Threat Prediction With Cyber Threat Intelligence
1. Health Information Security
2.Cybersecurity Companies
3. Research Positions
4. Digital Rights and Privacy Advocacy Groups
5. Fraud Investigation Units
6. Digital Forensic Consultants
7. Cybersecurity Consultancies
8. IT Departments
9. Corporate Security Departments
10.National Security Agencies 11.Cyber crime Units.
See What Students are saying..