Courses

E-Learning

Curriculum

  • Sl. No.
  • Chapter
  • Chapter - 1
  • Fundamentals of Cyber Security
  • Chapter - 2
  • Text Processing
  • Chapter - 3
  • Introduction to Linux and Networking
  • Chapter - 4
  • Introduction to Ethical Hacking
  • Chapter - 5
  • Footprinting and Reconnaissance
  • Chapter - 6
  • Scanning Networks
  • Chapter - 7
  • Enumeration
  • Chapter - 8
  • Vulnerability Analysis
  • Chapter - 9
  • System Hacking
  • Chapter - 10
  • Malware Threats
  • Chapter - 11
  • Sniffing
  • Chapter - 12
  • Social Engineering
  • Chapter - 13
  • Denial of Service
  • Chapter - 14
  • Session Hijacking
  • Chapter - 15
  • Evading IDS, Firewalls and Honeypot
  • Chapter - 16
  • Hacking Web Servers
  • Chapter - 17
  • Hacking Web Applications
  • Chapter - 18
  • SQL Injection
  • Chapter - 19
  • Hacking Wireless Networks
  • Chapter - 20
  • Hacking Mobile Platforms
  • Chapter - 21
  • IOT Hacking
  • Chapter - 22
  • Cloud Computing
  • Chapter - 23
  • Cryptography
  • Chapter - 24
  • Dual Specialization
  • Specialization -1
  • Specialization - 2
  • Specialization - 3
  • Specialization - 4
  • Specialization - 5
  • Specialization - 6
  • Specialization - 7
  • Specialization - 8
  • Specialization - 9
  • Specialization - 10

Contact Us

Post Graduate Program In Cyber Security, this Course and batch also available in other locations View

Top