Cyber Security/Ethical Hacking Program
What you'll learn
- Students and Recent Graduates intending to bridge the gap between academic knowledge and practical skills.
- Working Professionals looking to enhance career prospects and stay updated with industry trends.
- Career Changers and Professionals on break intending to pivot to new industries by acquiring relevant skills.
- Freelancers and Entrepreneurs interested in expanding expertise for business growth and innovation.
Cyber Security/Ethical Hacking
Program
Details
Introduction To
Ethical Hacking
• What Is Hacking?
• Hacker Classes
• Ethical Hacking
• Threat, Vulnerability, And Risk
• Importance Of InfoSec
• CIA Triad
• Security, Functionality, and Usability
• Hacking Methodologies
Reconnaissance
• Footprinting
• Procedures In Reconnaissance
• Data Retrieval Scope
• Footprinting Methods
• Reconnaissance Methods
• Active and Passive Reconnaissance
Scanning
• Why Scanning?
• Objectives Of Network Scanning
• Communication Flags
• Types Of Scan
• Identifying Results From Scans
Gaining & Maintaining Access
• Enumeration
• Information Enumerated
• Types Of Enumeration
• Enumeration Tools
• Gaining Access
• Maintaining Access
• Clearing Tracks
• Hacking Stages
• Penetration Testing
Sniffing & Passwords
• System Hacking Steps
• Password Complexity
• Password Cracking Techniques
• Defence Against Password Attacks
• Sniffing
• Types of Sniffing Attacks
• ARP Poisoning
• MAC Flooding
• DNS Poisoning
• DHCP Attack
• Sniffing Tools
• Defence Against Sniffing Attacks
Worms, Viruses & Trojans
• Trojan
• Communication Channels
• What Do Hackers Look For?
• Goals Of Trojan
• Types Of Trojans
• Indication Of A Trojan Attack
• Trojan Tools
• Computer Worm
• How Viruses Work?
• Types Of Viruses
• Counter Measures For Viruses and Worms
• Computer Virus
System Security
• DOS/DDOS Attack
• How Does DOS Work?
• Symptoms Of DOS
• Session Hijacking
• XSS Attack
• Steps Involved
• Session Hijacking Tools
• Prevention Against Session
• Hijacking
• DOS Techniques
• DOS Counter Measures
Web & Network Security
• How Web Applications Work
• SQL Injection Attack
• Wireless Networks
• Wireless Hacking
• Methodologies
• IDS/IPSs
• Firewalls
• WEP
• WPA
Vulnerability & Management Reporting
• Vulnerability Assessment
• Vulnerability Management Process
• Phases Of Vulnerability Management
• Report Writing
• Constituents Of A Report
Experience-Based Learning Approach
Real-World Industrial Projects

Ecommerce Vulnerability Assessment

Cybersecurity Toolkit

Web Application Penetration Testing

Certifications
> Enhances the substantial weight of your resume and LinkedIn profile
> Drives career growth and the potential to double your salary
> Facilitates promising placements for freshers
> Adds credibility to your skill set, tools knowledge, and project expertise
Certificate of paticipation(IIT Bombay)
Internship Certificate
Certificate of Project Completion
Our Mentors

Rishabh Chandnani
Having Experience of 10+ years in the field of AI & ML. Rishabh is working in Walmart as SDE 3.

Anubhav Tripathi
IIT Bhopal Mentor

Emil
Engineer in AutoDesk (Full Stack Developer)
Your questions answered
Common Students Queries
Who is eligible for Wipro certificate?
Wipro offers certification programs suitable for a diverse range of individuals including
• Students and recent graduates
• Working professionals
• Freelancers and entrepreneurs
How will I get this certificate?
- Labsity Project Certificate: After submitting your final projects, you can expect to receive the certificate within two weeks.
- Wipro certificate: there is an examination to get a C certificate.
- Internship certificate: You will receive this after completing internship with partnered company.
What is the validity of certificate?
Earn our certification and enjoy lifetime validation of your expertise, ensuring your credentials remain current and valuable throughout your career.
Is it possible to pursue this program simultaneously with my college studies?
Absolutely! Our program is designed to be flexible, allowing students to adapt it to their timetables. We recommend dedicating 7-10 hours per week to the course.
What advantages can I gain from having industry mentors?
Industry mentors are seasoned professionals from well-established companies with demonstrated expertise in specific domains. They serve as your ideal mentors to assist you in making informed decisions about your career path in the industry.
recomended Programs for 10x Productivity
- 5 Lessons
- 0 Lessons
- 25 Lessons
- 3 Lessons