Ethical Hacking

Ethical Hacking

Eduschaler Faculty
Eduschaler Certificate
Eduschaler Faculty

Basic (10 classes): 20 Hours - 10 Days Course

  • Target Audience: Individuals with no prior cybersecurity knowledge.
  • Course Goal: Establish a strong foundational understanding of cybersecurity concepts and best practices.

Module Breakdown:

  • Module 1 (2 classes): Introduction to Cybersecurity:
    • What is cybersecurity?
    • Types of cyber threats and attacks
    • Importance of cybersecurity in today’s world
  • Module 2 (2 classes): Secure Online Habits:
    • Password hygiene and management
    • Social engineering awareness and prevention
    • Safe browsing practices
    • Identifying phishing scams
  • Module 3 (2 classes): Network Security Fundamentals:
    • Understanding basic network concepts (firewalls, routers)
    • Introduction to secure network configurations
    • Securing your Wi-Fi network
  • Module 4 (2 classes): Data Security Basics:
    • Data classification (sensitive vs. non-sensitive)
    • Data encryption and decryption methods
    • Secure data storage practices
    • Data backup and recovery strategies
  • Module 5 (2 classes): Introduction to Security Tools:
    • Overview of common security software (antivirus, anti-malware)
    • Learning basic functionalities of security tools

Intermediate (15 classes): 28 Hours - 15 Days Course

  • Target Audience: Individuals with basic cybersecurity knowledge, looking to deepen their understanding.
  • Course Goal: Expand upon foundational concepts with practical applications and introduce intermediate security topics.

Module Breakdown (Building upon Basic modules):

  • Module 1 (2 classes): Operating System Security:
    • Hardening operating system configurations (Windows, macOS)
    • User account management and access control
    • Software updates and patch management
  • Module 2 (2 classes): Introduction to Cryptography:
    • Encryption and decryption algorithms
    • Public key infrastructure (PKI) and digital certificates
    • Understanding secure communication protocols (HTTPS)
  • Module 3 (2 classes): Web Application Security:
    • Common web application vulnerabilities (SQL injection, XSS)
    • Secure coding practices
    • Web application security testing basics
  • Module 4 (2 classes): Introduction to Network Security Controls:
    • Firewalls (types, functionalities)
    • Intrusion Detection and Prevention Systems (IDS/IPS)
    • Access Control Lists (ACLs)
  • Module 5 (2 classes): Secure System Administration:
    • User privilege management
    • System logging and monitoring
    • Vulnerability scanning and patching
  • Module 6 (2 classes): Introduction to Incident Response:
    • Recognizing security incidents
    • Incident response procedures
    • Data breach recovery
  • Module 7 (2 classes): Introduction to Risk Management:
    • Identifying cybersecurity risks
    • Vulnerability assessments and risk mitigation
    • Business continuity and disaster recovery planning

Advanced (25 classes): 48 Hours - 25 Days Course

  • Target Audience: Experienced cybersecurity professionals seeking to enhance their skillset.
  • Course Goal: Deep dive into advanced topics, introduce penetration testing methodologies, and explore security frameworks.

Module Breakdown (Building upon Intermediate modules):

  • Module 1 (2 classes): Introduction to Penetration Testing:
    • Penetration testing methodologies
    • Tools and techniques used by ethical hackers
    • Vulnerability exploitation and post-exploitation activities
  • Module 2 (3 classes): Linux Security Administration:
    • Advanced Linux system administration for security
    • Security tools and utilities on Linux (e.g., iptables, SELinux)
    • Scripting for automation in security tasks
  • Module 3 (2 classes): Introduction to Cloud Security:
    • Security considerations for cloud platforms (AWS, Azure)
    • Identity and Access Management (IAM) in the cloud
    • Cloud security best practices
  • Module 4 (2 classes): Secure Software Development (SSD):
    • Secure coding principles and practices
    • Application security testing methodologies (SAST, DAST)
    • Integrating security into the software development lifecycle (SDLC)
  • Module 5 (2 classes): Digital Forensics and Incident Response (DFIR):
    • Digital evidence collection and analysis techniques
    • Incident response forensics
    • Forensic tools and software
  • Module 6 (2 classes): Introduction to Security Operations Centers (SOC):
    • SOC functions and responsibilities
    • Security monitoring and threat detection
    • Security information and event management (SIEM)
  • Module 7 (3 classes): Ethical Hacking Techniques:
    • Advanced exploitation techniques (buffer overflows, privilege escalation)
    • Web application penetration testing methodologies (OWASP Top 10)
    • Wireless network security assessments
    • Module 8 (2 classes): Cryptography for Security Professionals:
    • Advanced cryptographic algorithms (AES, RSA)
    • Hashing functions and secure password storage
    • Secure communication protocols (VPN, SSH)
    • Module 9 (2 classes): Security Frameworks and Compliance:
    • Introduction to popular security frameworks (NIST CSF, ISO 27001)
    • Implementing security controls based on frameworks
    • Compliance requirements for different industries
    • Module 10 (2 classes): Introduction to Social Engineering:
    • Social engineering techniques used by attackers
    • Human behaviour and susceptibility to social engineering
    • Countermeasures against social engineering attacks
    • Module 11 (2 classes): Cybersecurity Career Paths and Resources:
    • Exploring different career opportunities in cybersecurity
    • Preparing for industry certifications (e.g., Security+, CISSP)
    • Staying up-to-date with the latest cybersecurity trends

CERTIFIED ETHICAL HACKING PROFESSIONAL ( CEHP )

 

( 50 Classes) : 100 Hours - 60 Days.

BASIC + INTERMEDIATE + ADVANCE COURSES

FREE ETHICAL HACKING TOOLS

ZAPBURPNESSUSMODIFIED KALI LINUXSQLMAPMETASPLOITNIKTONMAPWIRESHARKGOLANGO