Certified Cyber Security Associate

Duration | 35 Hours

A Cyber Security Specialist plays a vital role in ensuring the security of software systems, networks, and data centers during their development stages. Their responsibilities include identifying vulnerabilities and risks in hardware and software and managing and monitoring potential attacks or intrusions.

Prerequisites

Prospective students must have a high school diploma, completed the required math and science courses (specific prerequisites may vary by program), and possess proficiency in English.

Course Objectives

The Certified Cyber Security Associate program focuses on developing the foundational skills required to protect modern digital ecosystems effectively. The primary goal of ethical hacking is to assess the security of systems, networks, or infrastructures and identify potential vulnerabilities.

What You Will Learn

_______________________________________________

Our curriculum ensures that students gain comprehensive knowledge and hands-on experience in cybersecurity. Here's what you will learn throughout the course.

Ethical Hacking | DDOS Attacks

Fingerprinting

Wireless Hacking

Password Hacking

  • What are Botnets?

  • Types of DDoS Attacks

  • Cross-site Scripting

  • SQL Injection

  • Pen Testing

  • Basic Steps

  • Port Scanning

  • Ping Sweep

  • DNS Enumeration

  • Kismet

  • NetStumbler

  • Wired Equivalent Privacy

  • Wireless DoS Attacks

  • Social Engineering

  • Dictionary Attack

  • Hybrid Dictionary Attack

  • Brute-Force Attack

  • Rainbow Tables

Sniffing

  • Types of Sniffing

  • Hardware Protocol Analyzers

  • Lawful Interception

Ethical Hacking Overview

  • Types of Hacking

  • Advantages of Hacking

  • Disadvantages of Hacking

  • Purpose of Hacking

Footprinting

  • Domain Name Information

  • Finding IP Address

  • Finding Hosting Company

  • IP Address Ranges

  • History of the Website

ARP Poisoning

  • What is ARP Spoofing?

  • What is MITM?

  • ARP Poisoning − Exercise

DNS Poisoning

  • DNS Poisoning − Exercise

  • Defenses against DNS Poisoning

  • Ethical Hacking

  • Exploitation

  • Enumeration

  • Metasploit

  • Exploits of Metasploit

  • Metasploit Payloads

  • Trojan Attacks

  • TCP/IP Hijacking

  • Email Hijacking

  • Email Spoofing

  • Social Engineering

  • Inserting Viruses in a User System

Hacker Types & Features

  • White Hat Hackers

  • Black Hat Hackers

  • Grey Hat Hackers

  • Miscellaneous Hackers

  • Famous Hackers

  • Terminologies

  • Tools

  • Skills

  • Basic Skills

  • Courses & Certifications

  • Process

  • Ethical Hacking

  • Reconnaissance

Ready to get started?

Get in touch