ethical hacker
![](https://falconcybertech.in/wp-content/uploads/2021/09/intermediate-1.jpg)
The course contents will be based on the core steps of penetration testing – Information Gathering, Scanning, Enumeration, Exploitation & Reporting. The students will be taught defensive techniques on how to protect their IT infrastructure from attacks. This course is also beneficial to all the students who are currently pursuant in their studies in computer science / IT field or other allied engineering. This will help the students to get a start point in pursuing their career in cyber security. Also, system administrators & developers can too pursue this course to understand various security risks that exist and learn to defend against the same.
- Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality
- Chapter 2 : Gathering Target Infomation; Reconnaissance, Footprinting, and Social Engineering
- Chapter 3: Gathering Network and Host Information: Scanning and Enumeraion
- Chapter 4 : System Hacking: Password Cracking, Esclating Privileges, and Hiding Files
- Chapter 5 : Trojans, Backdoors, Viruses, and WormsÂ
- Chapter 6 : Gathering Data from Networks: Sniffers
- Chapter 7 : Denial of Service and Session hijacking
- Chapter 8 : Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and web-based password cracking techniques
- CHapter 9 : Attacking Applications: SQL injection and Buffer Overflows
- Chapter 10 :Â Wireless Network HackingÂ
- Chapter 11 : Physical Site Security
- Chapter 12 : Hacking Linux Systems
- Chapter 13 : Bypassing Network Security: Wvading IDS, Honeypots, and Firewalls
- Chapter 14 : Cryptography
- Chapter 15 : Perfoming a Penetration Test
This intermediate course on cyber security is firmly built upon the thorough experience of the faculty in the field of cyber security, penetration testing and security auditing. The course will be hands-on.
Course Duration : 40 days [1-1.5 hours, 5 days a week].
Â
Why Cyber Security ?
![](https://falconcybertech.in/wp-content/uploads/2021/09/3.png)
Rise of Cyber Crime
Be it a large scale or a small scale firm, hackers and cyber criminals spare no one. Rather, they lookout for opportunities to exploit data and get money out of these firms. Over the past year, the average cost of cyber crime for an organization has increased 23%.
![](https://falconcybertech.in/wp-content/uploads/2021/09/2-1.jpg)
Security of Data
When it comes to data security, it can be clearly seen how organizations are getting highly comfortable in keeping their information online. With the alarming number of data breaches and information leaks making news headlines almost every day
![](https://falconcybertech.in/wp-content/uploads/2021/09/1-1.jpg)
Growth of IoT Devices
With the mission to create smart cities with smart devices, our dependency to connect everything to the internet has increased too. The introduction of IoT technology i.e. Internet of Things, has not only simplified and speed up our tasks.