Introduction to Cyber Security
Course Description
Embark on a journey into the realm of cybersecurity with our comprehensive online course, "Introduction to Cyber Security - Ethical Hacking." In today's interconnected digital landscape, the need for skilled professionals who can safeguard against cyber threats has never been more critical.
The practice of Ethical Hacking involves the meticulous assessment and identification of vulnerabilities within digital systems, akin to the methods employed by malicious hackers. A certified ethical hacker plays a pivotal role in fortifying existing security measures while uncovering potential loopholes that could be exploited by adversaries. It's a profession that demands not only technical prowess but also a commitment to ethical standards. In this course, we delve into the ethical considerations surrounding hacking practices, emphasizing the importance of obtaining consent from clients before initiating any security assessments.
Key Learning Objectives:
- Understanding Ethical Hacking: Gain insight into the world of ethical hacking, exploring its different phases and methodologies. Attack Vectors: Explore various attack vectors utilized by hackers and understand how they can be thwarted through proactive defense mechanisms.
- Security Infrastructure Analysis: Learn to think like a hacker by comprehending the existing security infrastructure and identifying potential weaknesses.
- Defense Mechanisms: Discuss and evaluate defense mechanisms to strengthen cybersecurity measures and protect against potential threats.
- Vulnerability Identification: Acquire skills in identifying system weaknesses and vulnerabilities, essential for preemptive action against potential exploits.
- Risk Mitigation: Develop strategies to minimize the risk of malicious attacks and safeguard the digital presence of individuals, organizations, or governments.
Course Highlight
- Ethical Considerations: Emphasizes the importance of ethical hacking practices conducted with the explicit consent of clients.
- Real-world Applications: Apply theoretical knowledge to practical scenarios, preparing students for real-world cybersecurity challenges.
- Career Prospects: Understand the potential of ethical hacking as a fulfilling and rewarding career path in today's cybersecurity landscape.
Course Curriculum
- Session 1 - Introduction to Information Gathering Techniques (Recon) and Why
- Session 2 - Introduction to Hacking - Concepts and Terminologies
- Session 3 - Ethical Hacking vs Penetration Testing – Difference and objectives
- Session 4 - Security standards and laws governing hacking practices
- Session 5 - Security metrics and methodologies
- Session 6 - Hacking Lab Setup
- Session 7 - Getting acquainted with Kali Linux
- Session 8 - Scanning an environment – Network Scanning
- Session 1 - Introduction to Information Gathering Techniques (Recon) and Why
- Session 2 - Active and Passive Recon
- Session 3 - Reconnaissance – Target
- Session 4 - Reconnaissance – Open Source Intel Gathering
- Session 5 - Reconnaissance – Network and Web tools
- Session 6 - Scanning an environment – Port Scanning
- Session 7 - Scanning an environment – Vulnerability Scanning
Dr. R. Rakesh
Assistant ProfessorDr. R Rakesh is currently working as Assistant Professor in VIT University.