Edali Preloader

Key highlights

Things you will learn

Cyber Security

Program curriculum

  • What is Hacking?
  • Hacker Classes
  • Ethical Hacking
  • Threat, Vulnerability and Risk
  • Importance of InfoSec
  • CIA Triad
  • Security, Functionality and Usability
  • Hacking Methodologies
  • Footprinting
  • Procedures in Reconnaissance
  • Data Retrieval Scope
  • Footprinting Methods
  • Reconnaissance Methods
  • Active and Passive Reconnaissance
  • Why scanning?
  • Objectives of Network Scanning
  • Communication Flags
  • Types of Scan
  • Identifying results from Scans
  • Enumeration
  • Information Enumerated
  • Types of Enumeration
  • Enumeration Tools
  • Gaining Access
  • Maintaining Access
  • Clearing Tracks
  • Hacking Stages
  • Penetration Testing
  • System Hacking steps
  • Password Complexity
  • Password Cracking Techniques
  • Defence against Password Attacks
  • Sniffing
  • Types of Sniffing Attacks
  • ARP Poisoning
  • MAC Flooding
  • DNS poisoning
  • DHCP Attack
  • Sniffing Tools
  • Defence against Sniffing Attacks
  • Trojan
  • Communication Channels
  • What do hackers look for?
  • Goals of Trojan
  • Types of Trojans
  • Indication of a Trojan Attack
  • Trojan Tools
  • Computer Virus
  • Computer Worm
  • How Viruses work?
  • Types of Viruses
  • Counter Measures for Viruses and Worms
  • DOS/DDOS Attack
  • How does DOS work?
  • Symptoms of DOS
  • DOS Techniques
  • DOS Counter Measures
  • Session Hijacking
  • XSS Attack
  • Steps involved
  • Session Hijacking Tools
  • Prevention against Session Hijacking
  • How web applications work
  • SQL Injection Attack
  • Wireless networks
  • WEP
  • WPA
  • Wireless Hacking Methodologies
  • Firewalls
  • Vulnerability Assessment
  • Vulnerability Management Process
  • Phases of Vulnerability Management
  • Report Writing
  • Constituents of a Report

Tools you will get hands on

Upskilling plans

Pick your plan of action and train with us

Self paced

₹ 5,700

₹̶ ̶8̶,̶5̶0̶0̶
Save up to 30% each month
Mentor Led

₹ 8,500

₹̶ ̶1̶0̶,̶4̶9̶9̶
Save up to 30% each month

₹ 14,300

₹̶ ̶1̶8̶,̶0̶0̶0̶
Save up to 30% each month

Capstone projects

Undergo practical learning and work on real time projects 

Learn to run exploits on target machines.
Use enumeration tools to find information about the system.
Learn to create viruses and trojans.
Crack System passwords and account passwords for websites.

What our Students say about us

As a user, you can avail a the payment mode of your choice. The available modes are: UPI, debit/credit card, No cost EMI, Netbanking/Mobile banking.

When enrolling into SkillVertex’s training upskilling programs, you are associated with us for a duration of 2 months. Where as, with SkillVertex’s Advance Upskilling programs, you are associated with us for a duration of 5 months.

At SkillVertex, you are mentored by industry experts who have been/are working in the industry for a decent time and have a strong grasp in their domain of expertise. The process is tailored to provide concept clear training and practical hands-on learning during your upskilling journey.

With No cost EMI as a mode of payment, you can easily avail the same if you qualify a basic eligibility criteria.