Duration: 3 months
Overview:
The Certified Ethical Hacking course at Daffodil Institute of Science & Technology is designed to equip individuals with the skills and knowledge necessary to understand the mindset of a hacker and perform ethical hacking activities to identify and rectify security vulnerabilities within an organization’s network and systems. This course prepares participants for the Certified Ethical Hacker (CEH) certification exam.
Curriculum:
Introduction to Ethical Hacking: This module provides an overview of ethical hacking, including its principles, methodologies, and legal implications.
Foot printing and Reconnaissance: Participants learn techniques for gathering information about a target system or network through foot printing, reconnaissance, and social engineering.
Scanning Networks: This section covers various scanning techniques to identify live hosts, open ports, and services running on target systems using tools such as Nmap and Nessus.
Enumeration: Students learn to extract valuable information from target systems, including user accounts, shares, and other resources, using enumeration techniques.
Vulnerability Analysis: This module focuses on identifying and analyzing vulnerabilities in target systems, including common vulnerabilities and exposures (CVEs) and misconfigurations.
System Hacking: Participants learn to exploit vulnerabilities in target systems to gain unauthorized access, escalate privileges, and maintain access using techniques such as password cracking and backdoors.
Malware Threats: This section covers different types of malware threats, including viruses, worms, Trojans, and ransomware, along with techniques for malware analysis and detection.
Sniffing and Spoofing: Students gain insights into sniffing and spoofing attacks, including packet capturing, ARP spoofing, and DNS spoofing, and learn to mitigate these attacks.
Social Engineering: This module covers social engineering techniques used to manipulate individuals into divulging confidential information or performing actions that compromise security.
Denial-of-Service (DoS) Attacks: Participants learn about DoS and distributed denial-of-service (DDoS) attacks, including techniques for detecting and mitigating these attacks.
Evading IDS, Firewalls, and Honeypots: This section explores techniques for evading intrusion detection systems (IDS), firewalls, and honeypots to maintain stealth during ethical hacking activities.
Web Application Security: Students learn about common web application vulnerabilities and security best practices for securing web applications against attacks.
Practical Sessions:
Hands-on lab exercises allow students to apply ethical hacking techniques in a controlled environment, including penetration testing, vulnerability assessment, and exploit development.
Practical scenarios and case studies provide real-world insights into ethical hacking challenges and solutions.
Assessment:
Regular quizzes, assignments, and practical assessments evaluate student understanding and proficiency in ethical hacking concepts and techniques.
A final project or examination assesses comprehensive knowledge and skills acquired during the course.
Certification:
Upon successful completion of the course and passing the final assessment, students receive a certificate in Certified Ethical Hacking from Daffodil International Professional Training.
Conclusion:
The Certified Ethical Hacking course equips individuals with the skills and knowledge required to identify and mitigate security vulnerabilities within an organization’s network and systems ethically. With hands-on experience and practical insights, students are prepared to pursue careers in cybersecurity, penetration testing, or further certifications in ethical hacking and cybersecurity domains.