NCA IT SOLUTION
Iconic Corenthum Tower, Floor 24, Office no-2406A,
Electronic City Metro Station, Noida Sector 62
Opening Hours : 7 AM to 8 PM (All Days)

Cyber Security & Ethical Hacking

Course Image

Course Rate: INR 80000.00

Duration: 12 Months

About the Course:

Cyber Security & Ethical Hacking Course Syllabus
(*Network Security | Penetration Testing | Cryptography | Incident Response | Ethical Hacking*)

This **comprehensive syllabus** covers **cybersecurity fundamentals, ethical hacking, penetration testing, cryptography, and cloud security**, preparing you for **real-world** cybersecurity roles.

---

## **1. Introduction to Cyber Security & Ethical Hacking**
- What is Cyber Security?
- Importance of Cyber Security & Ethical Hacking
- Different Types of Cyber Attacks
- Cybersecurity vs Ethical Hacking vs Penetration Testing
- Cyber Laws & Compliance (GDPR, HIPAA, ISO 27001)

---

## **2. Networking & Security Basics**
- Networking Fundamentals (OSI & TCP/IP Models)
- IP Addressing, Subnetting & VPNs
- Network Security Basics (Firewalls, IDS/IPS, Proxies)
- Wireshark for Packet Analysis
- Secure Network Configuration

---

## **3. Cyber Threats & Vulnerabilities**
- Common Threats: Malware, Ransomware, Phishing, DDoS Attacks
- Vulnerability Assessment & Management
- Zero-Day Vulnerabilities
- Threat Intelligence & Analysis

---

## **4. Linux & Windows Security**
- Linux Command Line for Security Professionals
- User Management & Permissions
- Windows Security Policies & Hardening
- Active Directory Security
- Log Analysis & SIEM Tools (Splunk, ELK Stack)

---

## **5. Ethical Hacking & Penetration Testing**
- Ethical Hacking Methodology
- Penetration Testing Phases
- Setting Up a Hacking Lab (Kali Linux, Metasploitable)
- Information Gathering (Reconnaissance, Footprinting, OSINT)
- Scanning & Enumeration (Nmap, Netcat, Nikto)

---

## **6. Exploitation & Vulnerability Assessment**
- Web Application Security (OWASP Top 10)
- SQL Injection, XSS, CSRF, Command Injection
- Server-Side & Client-Side Attacks
- Buffer Overflow Exploits
- Exploiting Misconfigurations

---

## **7. Wireless & Mobile Security**
- Wi-Fi Security & Attacks (WEP, WPA, WPA2 Cracking)
- Wireless Packet Sniffing & MITM Attacks
- Mobile Security (Android & iOS Vulnerabilities)
- Mobile App Penetration Testing

---

## **8. Cryptography & Encryption**
- Basics of Cryptography (Symmetric vs Asymmetric Encryption)
- Hashing Algorithms (MD5, SHA-256)
- Digital Signatures & Certificates (SSL/TLS)
- Steganography & Data Hiding
- Secure Communication Protocols (PGP, SSH)

---

## **9. Social Engineering & Phishing Attacks**
- Types of Social Engineering Attacks
- Email & Website Phishing Techniques
- Spear Phishing & Whaling Attacks
- Defense Mechanisms & Awareness Training

---

## **10. Cloud Security & DevSecOps**
- Introduction to Cloud Security (AWS, Azure, GCP)
- Cloud Threats & Attack Vectors
- Secure Cloud Configurations
- DevSecOps & Secure CI/CD Pipelines
- Container Security (Docker & Kubernetes)

---

## **11. Digital Forensics & Incident Response**
- Introduction to Digital Forensics
- Evidence Collection & Preservation
- Incident Response Frameworks (NIST, SANS)
- Malware Analysis & Reverse Engineering
- Memory Forensics & Log Analysis

---

## **12. Bug Bounty & Web Application Security**
- Introduction to Bug Bounty Hunting
- Finding & Reporting Vulnerabilities
- Responsible Disclosure Programs
- Platforms (HackerOne, Bugcrowd)

---

## **13. Security Tools & Frameworks**
- Kali Linux, Metasploit, Burp Suite
- Nmap, Wireshark, Aircrack-ng
- Nessus, OpenVAS for Vulnerability Scanning
- OSINT Tools (Shodan, Maltego)

---

## **14. Compliance & Cyber Security Standards**
- ISO 27001, NIST Cybersecurity Framework
- GDPR & Data Protection Laws
- PCI-DSS for Payment Security
- HIPAA for Healthcare Security

---

## **15. Real-World Cyber Security Project**
- Ethical Hacking Challenge
- Secure Application Development
- Incident Handling & Reporting
- Cybersecurity Risk Assessment

---

Enroll Now
NCA IT Solution NOIDA