top of page

Ethical Hacking

cyber-laws-part-i-how-internet-has-become-a-crime-scene.jpg

Course Description

This comprehensive course introduces students to the exciting field of cyber security and ethical hacking. Participants will gain a solid foundation in understanding the principles of cyber security, the methodologies of ethical hacking, and the techniques used to protect digital systems from cyber threats. Through a blend of theory, hands-on labs, and practical exercises, students will develop the skills necessary to identify vulnerabilities, secure systems, and become proficient ethical hackers.

Module 1: Introduction to Cyber Security

​

  • Understanding the cyber threat landscape

  • Basic principles of information security

  • Importance of ethical hacking in modern cybersecurity

  • Legal and ethical considerations in ethical hacking

​

​

Module 2: Networking Fundamentals

​

  • TCP/IP fundamentals and network protocols

  • Subnetting and IP addressing

  • Network architecture and components

  • Network scanning and reconnaissance

​

​

Module 3: Operating System Security

​

  • Basics of operating systems (Windows, Linux, macOS)

  • User authentication and access control

  • Patch management and software updates

  • Hardening operating systems

​

​

Module 4: Web Application Security

​

  • Common web vulnerabilities (SQL injection, XSS, CSRF)

  • Web application architecture and components

  • Security practices for web development

  • Web application penetration testing

​

​

Module 5: Network Security

​

  • Firewalls, IDS, and IPS systems

  • VPNs and secure communication

  • Wireless network security

  • Network penetration testing

​

​

Module 6: Cryptography

​

  • Principles of cryptography

  • Encryption algorithms and methods

  • Digital signatures and certificates

  • Public key infrastructure (PKI)

​

​

Module 7: Ethical Hacking Methodology

​

  • Reconnaissance and information gathering

  • Scanning and enumeration

  • Vulnerability assessment and analysis

  • Exploitation and post-exploitation techniques

​

​

Module 8: Social Engineering and Physical Security

​

  • Psychological principles of social engineering

  • Phishing, pretexting, and baiting attacks

  • Physical security threats and countermeasures

​

​

Module 9: Malware Analysis and Reverse Engineering

​

  • Types of malware (viruses, worms, Trojans)

  • Malware analysis techniques

  • Introduction to reverse engineering

​

​

Module 10: Incident Response and Recovery

​

  • Incident response process and phases

  • Digital forensics fundamentals

  • Data recovery and preservation

​

​

Module 11: Emerging Technologies and Trends

​

  • Internet of Things (IoT) security

  • Cloud security considerations

  • Mobile device security

  • Blockchain and its security implications

​

​

Module 12: Legal and Ethical Aspects

​

  • Laws and regulations related to cyber security

  • Ethics in hacking and responsible disclosure

  • Building a career in ethical hacking

​

​

Syllabus Structure:

  • Each module consists of theory lectures, practical demonstrations, hands-on labs, and interactive discussions.

  • Practical exercises and labs will involve real-world scenarios, use of tools, and simulated environments for hands-on experience.

  • Regular quizzes and assessments to gauge understanding and progress.

  • Final project: Students will perform a comprehensive penetration test on a mock network, identifying vulnerabilities and proposing security measures.

bottom of page