Course Overview

Course Curriculum

Course Content

  • IITM CS - Ethical Hacking and VAPT

    Preview
    • Lesson 01: Foundation of Ethical Hacking

      • 1.01 Overview of Ethical Hacking
      • 1.02 Cyber Kill Chain Methodology
    • Lesson 02: Introduction to Passive Reconnaissance Techniques

      • 2.01 Overview of Reconnaissance
      • 2.02 Overview of Passive Reconnaissance
    • Lesson 03: Overview of Footprinting

      • 3.01 Understanding Footprinting Techniques and Tools
      • 3.02 Overview of Passive Footprinting
      • 3.03 Overview of Active Footprinting
    • Lesson 04: Overview of Active Reconnaissance

      • 4.01 Introduction to Active Reconnaissance Techniques
    • Lesson 05: Scanning and Enumeration: Probing Systems for Vulnerabilities

      • 5.01 Overview of Network Scanning
      • 5.02 Scanning Tools
      • 5.03 Port Scanning Techniques
      • 5.04 Introduction to NetBIOS Enumeration
      • 5.05 DNS Enumeration
    • Lesson 06: Vulnerability Analysis

      • 6.01 Cybersecurity Vulnerabilities and Assessment Methods
      • 6.02 Overview of Vulnerability Research
      • 6.03 Introduction to Vulnerability Assessment
      • 6.04 Understanding Vulnerability Scoring Systems
      • 6.05 Interconnection Between Research, Assessment, and Scoring
      • 6.06 Overview of the Vulnerability Management Lifecycle
    • Lesson 07: Comprehensive Vulnerability Assessment and Security Scanning

      • 7.01 Approaches to Vulnerability Assessment Solutions
      • 7.02 Interpreting CVSS Scores and Vector Components
      • 7.03 Scanner Operations and Configuration
      • 7.04 Generating and Analyzing Vulnerability Assessment Reports
    • Lesson 08: Introduction to Penetration Testing: Web and Wireless Security

      • 8.01 Fundamentals of Penetration Testing
      • 8.02 Standards, Types, and Phases of Penetration Testing
      • 8.03 Reconnaissance and Information Gathering
      • 8.04 Pentest Strategies and Threat Actors
      • 8.05 Penetration Testing: Gaining and Maintaining Access
    • Lesson 09: Social Engineering

      • 9.01 Introduction to Social Engineering
      • 9.02 Securing Against Insider Threats
      • 9.03 Understanding Identity Theft (Catfishing)
      • 9.04 Overview of Likejacking
      • 9.05 Media Sanitization Guidelines
    • Lesson 10: Denial of Service

      • 10.01 DoS and DDoS Attacks: Overview
      • 10.02 Understanding the Botnet Network
    • Lesson 11: Cloud and Container Security

      • 11.01 Introduction to Cloud Computing and Containerization
      • 11.02 Everything as a Service (XaaS) and Emerging Trends
      • 11.03 Understanding Container Technology
      • 11.04 Overview of Cloud Security Platforms
      • 11.05 Cloud Computing Threats
      • 11.06 Hacking Methodology in Cloud Computing
      • 11.07 Cloud Security Governance and Best Practices

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.