Cyber Security Academy

Certified Information Security and Ethical Hacker - CISEH

About the Programme

Unlike others, CISEH is a program which ensures that each candidate is exposed to the best practices in the domain of ethical hacking and is aware of the compliance requirements of the industry.

Course Content

  • Introduction
  • Types of Hacker
  • Common keywords
  • File Securing Techniques
  • Installing and using Kali Linux
  • Introduction
  • Types of Foot-printing
  • Methods and Techniques
  • Using Search Engine
  • IANA, Allotment of IP Address
  • IPv4 and Ipv6
  • IP Address - Basic, Detecting
  • Ping and Ping Sweep
  • Ping Sweeping tools
  • Nmap - common commands
  • Trace Router
  • Detecting Victim's OS
  • Detecting Firewall
  • Countermeasures
  • Type of Ports
  • Virtual Port numbers
  • Detecting Open Ports
  • Tools to carry out Port Scanning
  • Anti-Port scanning tools
  • Port Manager
  • Countermeasures
  • ICANN and Top Level Domains
  • Domain name Registration Process
  • LifecyclSS of gTLD
  • Whois Information
  • Domain and Hosting Panels
  • Global DNS resolution
  • Introduction
  • Staying Anonymous
  • Web Proxy
  • IP Proxy
  • Proxy Bouncing
  • Tor browser
  • Add-ons
  • Steganography and Steganalysis
  • Steganography tools
  • Types of Email ID
  • Email Protocols
  • Hacking Mailing Clients
  • Email Spoofing
  • Email Spamming
  • Mail Bomber tool
  • Email Headers
  • Domain and IP Blacklisting
  • Finding details of recipient
  • Countermeasures
  • Types of Malware
  • Virus
  • Trojan
  • Keylogger
  • File Binder
  • Testing FUD
  • Countermeasure
  • Introduction
  • Password Cracking Techniques
  • Dictionary Based Attack
  • Brute force Attack
  • Cracking common files password
  • Cracking web based password
  • Introduction to Kali Linux Password Cracking tools
  • Cracking Wifi password
  • Countermeasures for users
  • Countermeasures for System Administrators
  • Introduction
  • Basic Sniffing
  • Man-in-the-middle Attack
  • Introduction
  • Creating Phishing pages
  • Anti-phishing and Reporting methods
  • Countermeasures
  • Introduction
  • Buffer Overflow Attack
  • Batch file Scripting
  • DoS and DDoS Attacks countermeasure
  • HoneyPot Introduction
  • 0 day attacks - Case Study
  • Social Engineering attack
  • Ways to hack a website
  • Finding sensitive Data using Google Dorks
  • Finding Control Panel of Websites
  • SQL Injection basics
  • Live Task
  • Introduction
  • Mobile Malware
  • Call spoofing
  • Countermeasures
  • Introduction
  • 419 scam
  • Spamming email ID
  • Spamvertised domain
  • Phishing websites
  • Malware websites
  • Inappropriate content on website
  • Whois inaccuracy
  • Privacy Protected domains
  • Cyber Stalking
  • Fake profiles
  • Credit Card Frauds
  • Introduction
  • Cyber Law and Cyber Space
  • IT Act, 2000 and Amendments
  • Types of Crimes
  • Trademark Infringement
  • Copyright Infringement
  • CERT-In and DOT
  • Central Acts & State Acts
  • Blog and Website Monetization
  • Online Advertising
  • SEO basics
  • Increasing Website Traffic
  • Affiliate Marketing
  • Increasing likes & followers on Social Media

Duration

50 hours

Register Now

To register for the course, please fill in the details below and a BIBF representative will attend to you within the next 24 hours.


    Organization SponsoredSelf Sponsored

    TOP

    BIBF Digital Transformation Academy