Please wait.
Diploma In Ethical Hacking & Digital Forensics
Module 01: Ethical Hacking Fundamentals
? Hacking Concepts and Hacker Classes ? Different Phases of Hacking Cycle
? Ethical Hacking Concepts, Scope, and Limitations ? Ethical Hacking Tools
Module 02: Information Security Threats and Vulnerability Assessment
? Threat and Threat Sources ? Malware and its Types ? Vulnerabilities ? Vulnerability Assessment
Module 03: Password Cracking Techniques and Countermeasures
? Password Cracking Techniques ? Password Cracking Tools ? Password Cracking Countermeasures
Module 04: Social Engineering Techniques and Countermeasures
? Social Engineering Concepts and its Phases ? Social Engineering Techniques
? Insider Threats and Identity Theft ? Social Engineering Countermeasures
Module 05: Network Level Attacks and Countermeasures
? Sniffing ? Packet Sniffing Concepts ? Sniffing Techniques ? Sniffing Countermeasures ? Denial-of-Service
? DoS and DDoS Attacks ? DoS and DDoS Attack Countermeasures ? Session Hijacking ? Session Hijacking Attacks
? Session Hijacking Attack Countermeasures
Module 06: IoT and OT Attacks and Countermeasures
? IoT Attacks ? IoT Concepts ? IoT Threats and Attacks ? IoT Attack Countermeasures ? OT Attacks
? OT Concepts ? OT Threats and Attacks ? OT Attack Countermeasures
Module 7: Penetration Testing Fundamentals
? Fundamentals of Penetration Testing and its Benefits ? Strategies and Phases of Penetration Testing
? Guidelines and Recommendations for Penetration Testing
Digital Forensics
Module 01: Introduction to Computer Forensics
? Overview ? Objectives of Computer Forensics ? Branches of Digital Forensics ? Digital Forensics Process ? IT Act
Module 02: Cybercrime & Digital Evidence
? Overview ? Challenges in Forensic Investigation
? Principles & Rules of Forensic Investigation (include Locard’s Exchange principle)
? Digital Evidences ? Characteristics of Digital Evidence
? Rules of Evidence ? Sources of Evidence
? Gathering Digital Evidence: The Procedure
? Volatile Evidence ? Non-volatile data
? Chain of Custody ? Importance of Digital Evidence in the Court of Law
Module 03: Forensic Investigation Phases
? Overview ? Pre investigation ? Investigation ? Post investigation
Module 04: Forensics Investigation Methodology
? Secure Crime Scene and Shreds of evidence ? Photography and Videography of Evidence
? Sketching and Crime Scene Checklist ? Search, Collect & Seize Digital Evidences
? Data Acquisition ? Storage Formats for Digital Evidence
? Data Acquisition and Duplication Tools ? Data Acquisition Best Practice
? Forensic Investigation Report ? Examination & Analysis
? Report writing ? Courtroom presentation / Expert Witness
Module 05: Evidence Handlings
? Overview ? Investigation of Powered on and Powered off computer/device
? Computers, Components, and Devices ? Fundamentals of Hard Disk and File System
? File systems (Windows/Linux/Mac file system)
Module 06: Email Investigation
? Overview ? How Does Email Work?
? Email Identities and Data ? E-Mail Forensic Investigation Techniques
? IP & IP location ? Traceroute
? E-Mail Forensic Tools
We are Education, create your passion and inspiration. And hope success will come for your dream. Please send email and get latest news.