Oxford Certified Ethical Hacking
& Cloud Computing Professional (6 Months)
Ethical Hacker exposes vulnerabilities in software to help business owners fix those security holes before a malicious hacker discovers them. In this ethical hacking course, you learn all about Ethical hacking with live examples to make the ethical hacking clear. You will learn about reconnaissance, protocols, Windows hacking, attacking web technologies, and pen testing wireless networks etc.. You will look into administrative controls, technical controls, Cloud computing is very popular today and needed for the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet. Cloud services offer faster innovation, flexible resources, and economies of scale.We will learn to various aspects of cloud computing in this course.
ETHICAL HACKING
Overview of Current Security Trends, Understanding Elements of Information Security, Understanding Information Security Threats and Attack Vectors, Overview of hacking concepts, types, and phases, Understanding ethical hacking conceptsand scope, Overview of information security management and defense-in-depth, Overview of policies, procedures, and awareness, Overview of physical security and controls, Understanding incidence management process, Overview of vulnerability assessment and penetration testing, Overview of information security acts and laws
FOOTPRINTING, RECONNAISSANCE, SCANNING NETWORKS
Understanding footprinting concepts, Footprinting through search engines, advance google hacking techniques, social networking sites, Understanding different techniques for website-email footprinting, WHO IS footprinting, Understanding different techniques for network footprinting, Footprinting countermeasures, Overview of networking scanning,, Understanding different techniques to check for Live Systems, Understanding different techniques to check for Open Ports, Understanding various scanning techniques, Understanding various IDS Evasion Techniques
VULNERABILITY ANALYSIS, SYSTEM HACKING & MALWARE
Vulnerability analysis tools and techniques, Understanding different techniques to gain access to the system, Understanding privilege escalation techniques, Understanding different techniques to create and maintain remote access to the system Introduction to malware and malware propagation techniques, Overview of Trojans, Viruses, Worms their types, and how to infect systems
SOCIAL ENGINEERING, DOS, SESSION HIJACKING
Understanding various social engineering techniques & its insider threats, Countermeasures, Social Engineering Pen Testing, Identify theft countermeasuresDenial of Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks, Countermeasures & pen testing, Understanding the botnet networkApplication level & network level session hijacking, Countermeasures, Session hijacking penetration testing
HACKING WEB SERVERS & APPLICATIONS, FIREWALLS
Webserver attack methodology, attacking tools, Countermeasures, Web application security tools Web Appplications attack methodology, attacking tools, Countermeasures, Overview of web application penetration testingUnderstanding IDS, Firewall, and honeypot concepts, IDS/Firewall evading toolsUnderstanding different techniques to detect honeypots, IDS/Firewall evasion countermeasures
SQL INJECTION, HACKING WIRELESS NETWORKS
Understanding various types of SQL injection attack, Understanding SQL injection methodology, SQL injection tools, Understanding different IDS evasion techniques, SQL injection countermeasures, SQL injection detection toolsUnderstanding wireless concepts ,Understanding wireless encryption algorithms, Understanding wireless threats, Understanding wireless hacking methodology, Wireless hacking tools ,Understanding Bluetooth hacking techniques, Understanding wireless hacking countermeasures ,Wireless security tools , Overview of wireless penetration testing
CRYPTOGRAPHY, MOBILE PLATFORMS
nderstanding Cryptography concepts, Overview of encryption algorithms, Cryptography tools,Understanding Public Key Infrastructure (PKI), Understanding email encryption,Understanding disk encryptionUnderstanding Cryptography attacks,Cryptanalysis ToolsUnderstanding various Android OS threats and attacks, Understanding various IOS threats and attacks
CLOUD COMPUTING
Essential characteristics and benefits of Cloud Computing e.g. pay-per-use, etc. Key Cloud Service Providers - IBM Cloud, Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, etc. Common cloud service models (IaaS, PaaS, SaaS) and deployment models. Components of cloud infrastructure (Regions, Availability Zones, Data Centers, Virtualization, VMs, Bare Metal, Networking, and types of cloud storage. Emergent trends in cloud computing - including Hybrid MultiCloud, Containers, Microservices, Serverless, Cloud Native, DevOps, and Application Modernization. Concepts in cloud security, encryption and monitoring
CERTIFICATIONS*
During / After this course, students may also appear for the following certifications :
Certified Ethical Hacker CEH
www.oxfordinstitute.in