Cyber Security & Ethical Hacking

Become a Expert & Specialization in Cyber Security & Ethical Hacking

100% Placement Assistance | 1000+ Hiring Partners

About Cyber Security & Ethical Hacking

This Course will be taking you to the world of Cyber Security. Security Researchers of Rooman Technologies find the bugs/vulnerabilities in the large corporate organizations. They will be teaching you the Basics to the Advanced/Professional Level. You will be able to find out the bugs in the large corporate organizations which can lead you to succeed in the security world with much greater salary. Simultaneously you can have abroad opportunities in future.

Group 55Created with Sketch.

Who Need This Training?

Fresher / Diploma / Graduate /
Post-Graduate in any Stream.

Group 55Created with Sketch.

Duration

450 Hrs (2hrs/Day 12 Months, 4hrs/Day 6 Months or 8hrs/Day 3 Months).

Course Fee Details

₹ 25,000 /-

Course Outline

  • What is Hacking
  • Who is a Hacker
  • Skills of a Hacker
  • Types of Hackers
  • Reasons for Hacking
  • Who are at the risk of Hacking attacks
  • Effects of Computer Hacking on an organization
  • Network Security Challenges
  • Elements of Information Security: Confidentiality, Integrity & Availability
  • The Security, Functionality & Usability Triangle
  • What is Ethical Hacking
  • Why Ethical Hacking is Necessary
  • Scope & Limitations of Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing
  • Hacking
  • Internet protocol
  • Types of IP
  • Port
  • Protocol
  • Protocol service
  • OS for different hardware platforms
  • Vulnerability
  • Different Programming languages for different platforms/purposes.
  • What are Networks and what is networking
  • Network topologies
  • How the Networking devices communicate.
  • Vulnerable Hacking environments
  • Hashing checksums
  • Window/Linux commands
  • Php code overview
  • Assembly language programming overview
  • Introduction of kali
  • Introduction of backtrack
  • Introduction of parrot
  • What is Foot Printing
  • Objectives of Foot Printing
  • Finding a company’s details
  • Finding a company’s domain name
  • Finding a company’s Internal URLs
  • Finding a company’s Public and Restricted URLs
  • Finding a company’s Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Trace route analysis
  • Tracking e-mail communications
  • What is network scanning
  • Objectives of network scanning
  • Finding the live hosts in a network
  • Finding open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools
  • What is a Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • What is a proxy server
  • How does proxy server work
  • Types of proxy servers
  • How to find proxy servers
  • Why do hackers use proxy servers
  • What is a TOR network
  • Why hackers prefer to use TOR network
  • SNMP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, Communication infrastructure and end systems.
  • What is a sniffer
  • How sniffer works
  • Types of sniffing
  • Active sniffing
  • Passive Sniffing
  • What is promiscuous mode
  • How to put a PC into promiscuous mode
  • What is ARP
  • ARP poison attack
  • Threats of ARP poison attack
  • How MAC spoofing works
  • MAC Flooding
  • What is a CAM Table
  • How to defend against MAC Spoofing attacks
  • How to defend against Sniffers in network
  • What is system Hacking
  • Goals of System Hacking
  • Password Cracking
  • Password complexity
  • Finding the default
  • passwords of network devices and softwares
  • Password cracking methods
  • Online password cracking
  • Man-in-the-middle attack
  • Password guessing
  • Offline password cracking
  • Brute force cracking
  • Dictionary based cracking
  • Hybrid attack
  • USB password stealers
  • Elcomsoft Distributed password recovery tools
  • Active password changer
  • What is a Keylogger
  • How to deploy a Keylogger to a remote pc
  • How to defend against a Keylogger.
  • What is malware
  • Types of malware
  • Virus
  • What is a virus program
  • What are the properties of a virus program
  • How does a computer get infected by virus
  • Types of virus
  • Virus making tools
  • How to defend against virus attacks
  • Worm
  • What is a worm program
  • How worms are different from virus
  • Trojan
  • What is a Trojan horse
  • How does a Trojan operate
  • Types of Trojans
  • Identifying Trojan infections
  • How to defend against Trojans
  • Spyware
  • What is a spyware
  • Types of spywares
  • How to defend against spyware
  • Rootkits
  • What is a Rootkit
  • Types of Rootkits
  • How does Rootkit operate
  • How to defend against Rootkits
  • Explain Data Center Virtualization Concepts and
  • Identify Typical Data Center Challenges
  • Identify, Explain and Differentiate VMware vSphere Technologies
  • Perform Operational Tasks using the vSphere Web Client
  • Correlate VMware Virtualization Solutions with Common Data Center Business Challenges
  • What is Phishing
  • How Phishing website is hosted
  • How victims are tricked to access Phishing websites
  • How to differentiate a Phishing webpage from the original webpage
  • How to defend against Phishing attacks
  • SET: Social Engineering Toolkit
  • What is a DOS attack
  • What is a DDOS attack
  • Symptoms of a Dos attack
  • DoS attack techniques
  • What is a Botnet
  • Defending DoS attacks
  • What is session hijacking.
  • Dangers of session hijacking attacks
  • Session hijacking techniques
  • Cross-Site scripting attack
  • Session hijacking tools
  • How to defend against session hijacking.
  • What is a web server
  • Different webserver applications in use
  • Why are webservers hacked & its consequences
  • Directory traversal attacks
  • Website defacement
  • Website password brute forcing
  • How to defend against web server hacking
  • What is SQL Injection
  • Effects of SQL Injection attacks
  • Types of SQL Injection attacks
  • SQL Injection detection tools
  • Types of wireless networks
  • Wi-Fi usage statistics
  • Finding a Wi-Fi network
  • Types of Wi-Fi authentications
  • Using a centralized authentication server
  • Using local authentication
  • Types of Wi-Fi encryption methods
  • WEP
  • WPA
  • WPAT
  • How does WEP work
  • Weakness of  WEP encryption
  • How does WPA work
  • How does WPAT work
  • Hardware and software required to crack Wi-Fi networks
  • How to crack WEP encryption
  • How to crack WPA encryption
  • How to crack WPAT encryption
  • How to defend against Wi-Fi cracking attacks
  • What is Kali Linux
  • How Kali Linux is different from other Linux distributions
  • What are the uses of Kali Linux
  • Tools for Footprinting, Scanning & Sniffing
  • What is Metasploit framework
  • Using Metasploit framework to attack Windows machines
  • Using Metasploit framework to attack Android mobile devices
  • What is a Firewall
  • What are the functions of a Firewall
  • What is an IDS
  • How does an IDS work
  • SPAN
  • IDS tools
  • What is a honeypot
  • Types of honeypots
  • Honeypot tools
  • Honeypot detection tools
  • Different threats to IoT platforms and learn how to defend IoT devices securely.
Toggle Content
  • What is Cloud
  • What are the cloud services
  • Various cloud computing concepts, threats, attacks, and security techniques and tools (Cloud security).
  • What is Cryptography
  • Types of cryptography
  • Cipher algorithms
  • Public key infrastructure
  • What is a Hash
  • Cryptography attacks
  • What is Penetration Testing
  • Types of Penetration Testing
  • What is to be tested
  • Testing the network devices for misconfiguration
  • Testing the servers and hosting applications for misconfiguration
  • Testing the servers and hosting applications for vulnerabilities
  • Testing wireless networks
  • Testing for Denial of Service attack
  • Types of Firewall
  • Packet Filtering Firewall
  • Circuit-Level Gateway Firewall
  • Application-Level Firewall
  • Stateful Multilayer Inspection Firewall
  • Limitations of a Firewall
  • IDS / IPS
  • What is an IDS
  • What is a IPS
  • Difference between IDS & IPS
  • Placement of IDS in the Network
  • Configuring an IDS in the Network
  • Placement of IPS in the Network
  • Configuring an IPS in the Network
  • UTM / Next-Generation Firewall
  • What is a UTM
  • Features of UTM
  • Difference between a Firewall & a UTM
  • Placement of UTM in the Network
  • Configuring a UTM in the Network
  • Monitoring attacks using UTM
  • Configuring IPS module in UTM to detect and stop attacks
  • Identifying the Vulnerabilities of a system
  • Understanding the Vulnerabilities of a system
  • CVE ID
  • Bugtraq ID
  • Patch Management
  • Identifying the patch for a Vulnerability
  • Downloading the Patch
  • Testing the patch for stability in test environment
  • Deploying the patch to Live Network
  • Finding the missing updates in an Operating System
  • Microsoft Baseline Security Analyser
  • Belarc Advisor
  • Scanning systems for Malware infections
  • Types of anti-malwares
  • Anti-Virus
  • Anti-Worm
  • Anti-Trojan
  • Anti-Rootkit
  • Internet Security Suites
  • HIDS
  • HIPS

Career Prospects

Request more information?

If you have any questions, please don't hesitate to ask, fill the enquiry form or call 7406861111

Supporting Enterprises Around the Globe

Our programs are designed to give you the skills you need to be successful in your career.

GET IN TOUCH WITH OUR EXPERTS

Let us know your areas of interest so that we can serve you better

Cyber Security & Ethical Hacking

Become a Expert & Specialization in Cyber Security & Ethical Hacking

100% Placement Assistance | 1000+ Hiring Partners

About Cyber Security & Ethical Hacking

This Course will be taking you to the world of Cyber Security. Security Researchers of Rooman Technologies find the bugs/vulnerabilities in the large corporate organizations. They will be teaching you the Basics to the Advanced/Professional Level. You will be able to find out the bugs in the large corporate organizations which can lead you to succeed in the security world with much greater salary. Simultaneously you can have abroad opportunities in future.

Who Need This Training?

Fresher / Diploma / Graduate /
Post-Graduate in any Stream.

Duration

450 Hrs (2hrs/Day 12 Months, 4hrs/Day 6 Months or 8hrs/Day 3 Months).

Course Fee Details

₹ 25,000 /-

Course Outline

  • What is Hacking
  • Who is a Hacker
  • Skills of a Hacker
  • Types of Hackers
  • Reasons for Hacking
  • Who are at the risk of Hacking attacks
  • Effects of Computer Hacking on an organization
  • Network Security Challenges
  • Elements of Information Security: Confidentiality, Integrity & Availability
  • The Security, Functionality & Usability Triangle
  • What is Ethical Hacking
  • Why Ethical Hacking is Necessary
  • Scope & Limitations of Ethical Hacking
  • What is Penetration Testing
  • What is Vulnerability Auditing
  • Hacking
  • Internet protocol
  • Types of IP
  • Port
  • Protocol
  • Protocol service
  • OS for different hardware platforms
  • Vulnerability
  • Different Programming languages for different platforms/purposes.
  • What are Networks and what is networking
  • Network topologies
  • How the Networking devices communicate.
  • Vulnerable Hacking environments
  • Hashing checksums
  • Window/Linux commands
  • Php code overview
  • Assembly language programming overview
  • Introduction of kali
  • Introduction of backtrack
  • Introduction of parrot
  • What is Foot Printing
  • Objectives of Foot Printing
  • Finding a company’s details
  • Finding a company’s domain name
  • Finding a company’s Internal URLs
  • Finding a company’s Public and Restricted URLs
  • Finding a company’s Server details
  • Finding the details of domain registration
  • Finding the range of IP Address
  • Finding the DNS information
  • Finding the services running on the server
  • Finding the location of servers
  • Trace route analysis
  • Tracking e-mail communications
  • What is network scanning
  • Objectives of network scanning
  • Finding the live hosts in a network
  • Finding open ports on a server
  • Finding the services on a server
  • OS fingerprinting
  • Server Banner grabbing tools
  • What is a Vulnerability Scanning
  • Vulnerability Scanner tools
  • Finding more details about a vulnerability
  • What is a proxy server
  • How does proxy server work
  • Types of proxy servers
  • How to find proxy servers
  • Why do hackers use proxy servers
  • What is a TOR network
  • Why hackers prefer to use TOR network
  • SNMP Enumeration
  • SMTP Enumeration
  • DNS Enumeration
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, Communication infrastructure and end systems.
  • What is a sniffer
  • How sniffer works
  • Types of sniffing
  • Active sniffing
  • Passive Sniffing
  • What is promiscuous mode
  • How to put a PC into promiscuous mode
  • What is ARP
  • ARP poison attack
  • Threats of ARP poison attack
  • How MAC spoofing works
  • MAC Flooding
  • What is a CAM Table
  • How to defend against MAC Spoofing attacks
  • How to defend against Sniffers in network
  • What is system Hacking
  • Goals of System Hacking
  • Password Cracking
  • Password complexity
  • Finding the default
  • passwords of network devices and softwares
  • Password cracking methods
  • Online password cracking
  • Man-in-the-middle attack
  • Password guessing
  • Offline password cracking
  • Brute force cracking
  • Dictionary based cracking
  • Hybrid attack
  • USB password stealers
  • Elcomsoft Distributed password recovery tools
  • Active password changer
  • What is a Keylogger
  • How to deploy a Keylogger to a remote pc
  • How to defend against a Keylogger.
  • What is malware
  • Types of malware
  • Virus
  • What is a virus program
  • What are the properties of a virus program
  • How does a computer get infected by virus
  • Types of virus
  • Virus making tools
  • How to defend against virus attacks
  • Worm
  • What is a worm program
  • How worms are different from virus
  • Trojan
  • What is a Trojan horse
  • How does a Trojan operate
  • Types of Trojans
  • Identifying Trojan infections
  • How to defend against Trojans
  • Spyware
  • What is a spyware
  • Types of spywares
  • How to defend against spyware
  • Rootkits
  • What is a Rootkit
  • Types of Rootkits
  • How does Rootkit operate
  • How to defend against Rootkits
  • What is Phishing
  • How Phishing website is hosted
  • How victims are tricked to access Phishing websites
  • How to differentiate a Phishing webpage from the original webpage
  • How to defend against Phishing attacks
  • SET: Social Engineering Toolkit
  • What is a DOS attack
  • What is a DDOS attack
  • Symptoms of a Dos attack
  • DoS attack techniques
  • What is a Botnet
  • Defending DoS attacks
  • What is session hijacking.
  • Dangers of session hijacking attacks
  • Session hijacking techniques
  • Cross-Site scripting attack
  • Session hijacking tools
  • How to defend against session hijacking.
  • What is a web server
  • Different webserver applications in use
  • Why are webservers hacked & its consequences
  • Directory traversal attacks
  • Website defacement
  • Website password brute forcing
  • How to defend against web server hacking
  • What is SQL Injection
  • Effects of SQL Injection attacks
  • Types of SQL Injection attacks
  • SQL Injection detection tools
  • Types of wireless networks
  • Wi-Fi usage statistics
  • Finding a Wi-Fi network
  • Types of Wi-Fi authentications
  • Using a centralized authentication server
  • Using local authentication
  • Types of Wi-Fi encryption methods
  • WEP
  • WPA
  • WPAT
  • How does WEP work
  • Weakness of  WEP encryption
  • How does WPA work
  • How does WPAT work
  • Hardware and software required to crack Wi-Fi networks
  • How to crack WEP encryption
  • How to crack WPA encryption
  • How to crack WPAT encryption
  • How to defend against Wi-Fi cracking attacks
  • What is Kali Linux
  • How Kali Linux is different from other Linux distributions
  • What are the uses of Kali Linux
  • Tools for Footprinting, Scanning & Sniffing
  • What is Metasploit framework
  • Using Metasploit framework to attack Windows machines
  • Using Metasploit framework to attack Android mobile devices
  •  
  • What is a Firewall
  • What are the functions of a Firewall
  • What is an IDS
  • How does an IDS work
  • SPAN
  • IDS tools
  • What is a honeypot
  • Types of honeypots
  • Honeypot tools
  • Honeypot detection tools
  • Different threats to IoT platforms and learn how to defend IoT devices securely.
  • What is Cloud
  • What are the cloud services
  • Various cloud computing concepts, threats, attacks, and security techniques and tools (Cloud security).

Career Prospects

Live Projects & Case Studies

If you have any questions, please don't hesitate to ask, fill the enquiry form

or

Supporting Enterprises Around the Globe

Our programs are designed to give you the skills you need to be successful in your career.

Get in touch
with our experts

Let us know your technological interest so we can serve you better