Loading...

Please wait.

Welcome To The India's Biggest IT Education Hub. Our New collaboration with MCITER Maharashtra . Kindly verify your old Mark sheet before 2021 on Www.edgeeducations.org.

Diploma In Ethical Hacking & Digital Forensics

Diploma In Ethical Hacking & Digital Forensics
  • Course Code : ED219
  • Course Type : gold
  • Duration : 3 months
  • Eligibility : 10
  • Status : Active

Diploma In Ethical Hacking & Digital Forensics 

Module 01: Ethical Hacking Fundamentals
? Hacking Concepts and Hacker Classes                         ? Different Phases of Hacking Cycle
? Ethical Hacking Concepts, Scope, and Limitations        ? Ethical Hacking Tools

Module 02: Information Security Threats and Vulnerability Assessment
? Threat and Threat Sources           ? Malware and its Types           ? Vulnerabilities      ? Vulnerability Assessment

Module 03: Password Cracking Techniques and Countermeasures
? Password Cracking Techniques      ? Password Cracking Tools    ? Password Cracking Countermeasures

Module 04: Social Engineering Techniques and Countermeasures
? Social Engineering Concepts and its Phases               ? Social Engineering Techniques
? Insider Threats and Identity Theft                                 ? Social Engineering Countermeasures

Module 05: Network Level Attacks and Countermeasures
? Sniffing      ? Packet Sniffing Concepts        ? Sniffing Techniques        ? Sniffing Countermeasures     ? Denial-of-Service
? DoS and DDoS Attacks     ? DoS and DDoS Attack Countermeasures ? Session Hijacking                  ? Session Hijacking Attacks
? Session Hijacking Attack Countermeasures

Module 06: IoT and OT Attacks and Countermeasures
? IoT Attacks         ? IoT Concepts           ? IoT Threats and Attacks          ? IoT Attack Countermeasures         ? OT Attacks
? OT Concepts     ? OT Threats and Attacks       ? OT Attack Countermeasures

Module 7: Penetration Testing Fundamentals
? Fundamentals of Penetration Testing and its Benefits    ? Strategies and Phases of Penetration Testing
? Guidelines and Recommendations for Penetration Testing

Digital Forensics
Module 01: Introduction to Computer Forensics
? Overview         ? Objectives of Computer Forensics         ? Branches of Digital Forensics         ? Digital Forensics Process      ? IT Act

Module 02: Cybercrime & Digital Evidence
? Overview                                    ? Challenges in Forensic Investigation
? Principles & Rules of Forensic Investigation (include Locard’s Exchange principle)
? Digital Evidences                      ? Characteristics of Digital Evidence
? Rules of Evidence                    ? Sources of Evidence
? Gathering Digital Evidence: The Procedure
? Volatile Evidence                     ? Non-volatile data
? Chain of Custody                     ? Importance of Digital Evidence in the Court of Law

Module 03: Forensic Investigation Phases
? Overview        ? Pre investigation       ? Investigation        ? Post investigation

Module 04: Forensics Investigation Methodology
? Secure Crime Scene and Shreds of evidence                     ? Photography and Videography of Evidence
? Sketching and Crime Scene Checklist                                ? Search, Collect & Seize Digital Evidences
? Data Acquisition                                                                  ? Storage Formats for Digital Evidence
? Data Acquisition and Duplication Tools                               ? Data Acquisition Best Practice
? Forensic Investigation Report                                             ? Examination & Analysis
? Report writing                                                                     ? Courtroom presentation / Expert Witness

Module 05: Evidence Handlings
? Overview                                                             ? Investigation of Powered on and Powered off computer/device
? Computers, Components, and Devices             ? Fundamentals of Hard Disk and File System
? File systems (Windows/Linux/Mac file system)

Module 06: Email Investigation
? Overview                                           ? How Does Email Work?
? Email Identities and Data                 ? E-Mail Forensic Investigation Techniques
? IP & IP location                                ? Traceroute
? E-Mail Forensic Tools

Edge Educations

We are Education, create your passion and inspiration. And hope success will come for your dream. Please send email and get latest news.

Contact Info