Cyber Security & Ethical Hacking Certification-Ready Training

Rs. 30,000

Starting in

Get hands-on cyber security and ethical hacking training from industry experts to boost your career.
Start Date
Jun 17, 2023
End Date
Aug 13, 2023
Timing
Weekends
Location
Online
Type
Instructor Led
Duration
80 Hours
training image

Overview


Dice presents complete training on Cybersecurity & Ethical Hacking.
 
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
 
 70% Hands-on
 30% Theory
 Training Completion Certificate*

Tools Covered

  • Fresh Graduates with the passion to pursue their career in Cyber Security.
  • Industry Professionals who want to change their domain.
  • Security Managers and Risk managers who want to enhance their cyber security skills

  • Understanding of cybersecurity concepts: Gain a deep understanding of fundamental concepts such as network security, cryptography, and threat intelligence.
  • Hands-on experience: Gain practical experience through real-world projects and lab exercises, which cover topics such as penetration testing and vulnerability assessment.
  • Ethical hacking tools and techniques: Learn to use ethical hacking tools and techniques such as Kali Linux, Metasploit, and Burp Suite to identify and exploit vulnerabilities in systems.
  • Incident response: Learn to develop and implement incident response plans to prevent, detect, and respond to cybersecurity incidents.
  • Communication skills: Develop effective communication skills to explain cybersecurity risks, vulnerabilities, and remediation strategies to technical and non-technical stakeholders.

Meet the Instructor

Muhammad Moizuddin Rafay

Cyber Security Engineer | Ethical Hacker

Muhammad Moizuddin Rafay

Cyber Security Engineer | Ethical Hacker


I am cybersecurity engineer, ethical hacker, penetration tester. Working as cybersecurity and ethical hacking professional trainer.


Course Outline

  • Information security concepts
  • Threads, attacks, IoCs, Cyber kill chain
  • Open Source Intelligence gathering
  • Recon through search engines

  • Scanning techniques
  • Network Pentesting
  • Scanning with Angry IP scanner, Nmap
  • Online Scanning tools
  • Open Source scanning tools
  • Different Network Protocols
  • Services associated with Protocols
  • NetBIOS, smtp, snmp, dns
  • Enumeration within the network
  • Discussion on real life examples

  • What is VAPT
  • VAPT Phases
  • VAPT Industrial best security practice
  • VAPT Assessment tools and reports
  • Techniques to gain access to system
  • Privilege Escalation
  • Practical with Nessus
  • Manual testing with Nmap (advanced usage)
  • Windows binary backdooring
  • System Pwning with exploits

  • Mobile OS Architecture
  • Mobile Security
  • MDM and Spywares
  • Types of Malwares
  • Malware Analysis
  • Malware Protection
  • Endpoint Security
  • Mobile Security testing
  • Securing Mobile Devices
  • Creating Malware with Msfvenom
  • Hacking system with Malware

  • What are web servers
  • Risks related to Web servers
  • Web Servers attack defence
  • Hacking web server using different techniques
  • Web application attacks
  • OWASP framework
  • Attacks and Prevention
  • Tools for Web security
  • Sql injection
  • Types of SQLi
  • Mitigation of SQLi
  • OS Command Injection
  • LFI and RFI
  • XSS attacks
  • Burpsuite Intro and usage
  • Dumping data using Sqlmap

  • Social Engineering conecpts
  • Identity and Access management
  • Social Engineering countermeasures
  • Social Engineering in real life
  • Cloud Architecture
  • Cloud Threats
  • Cloud Security

  • DOS and DDOS
  • DOS Techniques
  • Detecting and Mitigating DOS attack
  • Analyzing DOS attack
  • Crashing systems with DOS
  • Firewall types
  • Firewall deployement Models
  • Industry practice for firewall and Discussion
  • Different HoneyBots

  • Sniffing concepts
  • Types of sniffing
  • Defence against sniffing
  • Session Hijacking on OSI Layers
  • Application level session hijacking
  • FAQ

Our Methodology

Industry Usecases

With real world projects and immersive content built in partnership with top tier companies, you’ll master the tech skills companies want.

Technical Support

Our knowledgeable mentors guide your learning and are focused on answering your questions, motivating you and keeping you on track.

Career Mentorship

You’ll have access to resume support, portfolio review and optimization to help you advance your career and land a high-paying role.

Frequently Asked Questions

Don’t worry!  We have got you covered. You shall be shared recorded lectures after each session, in case you want to revise your concepts or miss the lecture due to some personal or professional commitment

Duration: 8 weeks
Timings: Saturday & Sunday 11 AM to 4 PM

Yes, you can rejoin the training within the span of an year of your registration. Please note following conditions in case you’re rejoining.
1) There are only 5 seats specified for rejoiners in each iteration
2) These seats will be served on first come first basis
3) If you have not submitted your complete fee, you may not be able to rejoin. Your registration would be canceled

Since our courses are led by Industry Experts so it is made sure that content covered in course is designed with hand on knowledge of more than 50% along with supporting theory.

Classes will be interactive throughout & LIVE on Zoom. You would be able to ask questions & share views with the Technical Assistant, Trainer & class other participants.

For this professional course, you need to have a PC with minimum 4GB RAM and ideally 8GB RAM.

Yes, you will be awarded with a course completion certificate by Dice Analytics. We also keenly conduct an annual convocation for the appreciation and recognition of our students..

Since our instructors are industry experts so they do train the students about practical world and also recommend the shinning students in industry for relevant positions
So, what's your plan?

Follow the footsteps of thousands of successful alumni...

Reserve Seat
svg img
Reserve Seat