Scode Network offers Cyber Security courses with live projects by an expert trainer. Cyber Security course specifically designed for Under-Graduates students, Graduates students, working professional’s learners, and Freelancers.
cyber_security_syllabus .pdf | scode network institute
1. www.scodenetwork.com
Cyber Security Course
Ethical Hacking course :-
Table of Contents:
Program Overview
Program Features
Delivery Mode
Prerequisites
Target Audience
Key Learning Outcomes
Certification Alignment
Certification Details and Criteria
Course Curriculum
Customer Reviews
About Us
2. www.scodenetwork.com
Program Overview:
Simplilearn’s CEH certification training course provides you with the hands-on training
required to master the techniques hackers use to penetrate network systems, helping you
fortify your system against it. This ethical hacking course is aligned with the latest version
of CEH (v11)by the EC-Council and adequately prepares you to increase your blue team
skills.
Program Features:
40 hours of instructor-led training
Accredited training partner of EC-Council
Six months free access to CEH v11 iLabs
Study material by EC-Council (e-kit)
20 current security domains
Covers 340 attack technologies
Exam pass guarantee (For the US only)
Delivery Mode:
Blended Learning
Prerequisites:
There is no specific eligibility criteria for Certified Ethical Hacker (CEH) training and
certification, but we recommend a basic knowledge of TCP/IP.
Target Audience:
Network security officers and
practitioners
Site administrators
IS/IT specialist, analyst, or manager
IS/IT auditor or consultant
IT operations manager
IT security specialist, analyst, manager,
architect, or administrator
IT security officer, auditor, or engineer
Network specialist, analyst, manager,
architect, consultant, or administrator
Technical support engineer
Senior systems engineer
Systems analyst or administrator
3. Key Learning Outcomes:
This ethical hacking course will help you:
Grasp the step-by-step methodology and tactics that hackers use to penetrate network
systems
Understand the finer nuances of trojans, backdoors, and countermeasures
Get a better understanding of IDS, firewalls, honeypots, and wireless hacking
Master advanced hacking concepts, including mobile device and smartphone hacking, writing
virus codes, exploit writing and reverse engineering, and corporate espionage
Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS
and Apache web servers, Windows system administration using Powershell, and hacking SQL and
Oracle databases
Cover the latest developments in mobile and web technologies, including Android, iOS,
BlackBerry, Windows Phone, and HTML 5
Learn advanced log management for information assurance and manage information security
with more clarity
Certification Alignment:
Our Certified Ethical Hacker course is accredited by the EC-Council. We are the registered
training provider for this course.
Certification Details and Criteria:
Certification Details -
To become CEH certified, you must pass the CEH examination after either attending CEH training
at an accredited training center like Simplilearn or through self-study. If you choose self-study, you
must fill out an application and submit proof of at least two years of experience in the network
security domain. The purpose of the CEH credential is to:
Establish and govern minimum standards for credentialing professional information security
specialists in ethical hacking measures
Inform the public that credentialed individuals meet or exceed the minimum standards
Reinforce ethical hacking as a unique and self-regulating profession
About the Exam
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice
Test Delivery: ECC EXAM, VUE
Exam Prefix: 312-50 (ECC EXAM), 312-50
(VUE)
www.scodenetwork.com
4. Simplilearn Certification Criteria:
www.scodenetwork.com
Attend one complete class
Course Curriculum:
Module 01 - Introduction to Ethical Hacking
Lesson 01- Information Security Overview
Lesson 02 - Information Security Threats and Attack Vectors
Lesson 06 - Penetration Testing Concepts
Lesson 03 - Hacking Concepts
Lesson 04 - Ethical Hacking Concepts
Lesson 05 - Information Security Controls
Lesson 07 - Information Security Laws and Standards
Lesson 02 - Footprinting and Reconnaissance
Lesson 01- Footprinting Concepts
Lesson 02 - Footprinting through Search Engines
Lesson 03 - Footprinting through Web Services
Lesson 04 - Footprinting through Social Networking Sites
Lesson 05 - Website Footprinting
Lesson 06 - Email Footprinting
Lesson 07 - Competitive Intelligence
Lesson 08 - W hois Footprinting
Lesson 09 - DNS Footprinting
Lesson 10- Network Footprinting
Lesson 11-Footprinting through Social Engineering
Lesson 12- Footprinting Tools
Lesson 13 - Countermeasures
Lesson 14- Footprinting Pen Testing
Module 03 - Scanning Networks
Lesson 01- Network Scanning Concepts
Lesson 02 - Scanning Tools
Lesson 03 - Scanning Techniques
Lesson 04 - Scanning Beyond IDS and Firewall
Lesson 05 - Banner Grabbing
Lesson 06 - Draw Network Diagrams
Lesson 07 - Scanning Pen Testing
9. Module 16- Hacking Wireless Networks
www.scodenetwork.com
Lesson 01-Cryptography ConceptsLesson
02- Encryption Algorithms Lesson 03-
Cryptography Tools
Lesson 04- Public Key Infrastructure (PKI)Lesson
05- Email Encryption
Lesson 06- Disk EncryptionLesson
07- Cryptanalysis
Lesson 08- Countermeasures
COURSE CURRICULUM
Network Fundamentals
Explain the role and function of network components
Routers
L2 and L3 switches
Next-generation firewalls and IPS
Access points
Controllers (Cisco DNA Center and WLC)
Endpoints
Servers
Describe characteristics of network topology architectures
2 tier
3 tier
Spine-leaf
WAN
Small office/home office (SOHO)
On-premises and cloud
Compare physical interface and cabling types
Single-mode fiber, multimode fiber, copper
Connections (Ethernet shared media and point-to-point)
Concepts of PoE
Identify interface and cable issues (collisions, errors,
mismatch duplex, and/or speed)Compare TCP to UDP
Configure and verify IPv4 addressing and subnetting
Describe the need for private IPv4 addressing
Configure and verify IPv6 addressing and prefix
10. Module 16- Hacking Wireless Networks
www.scodenetwork.com
Compare IPv6 address types 1.9.a Global unicast
Unique local
Link local
Anycast
Multicast
Modified EUI 64
Verify IP parameters for Client OS (Windows, Mac OS, Linux)
Describe wireless principles
Nonoverlapping Wi-Fi channels
SSID
RF
Encryption
11. Module 16- Hacking Wireless Networks
www.scodenetwork.com
Explain virtualization fundamentals (virtual machines)
Describe switching concepts
MAC learning and aging
Frame switching
Frame flooding
MAC address table
2.0 Network Access
Configure and verify VLANs (normal range) spanning multiple switches
Access ports (data and voice)
Default VLAN
Connectivity
Configure and verify interswitch connectivity
Trunk ports
802.1Q
Native VLAN
Configure and verify Layer 2 discovery protocols (Cisco
Discovery Protocol and LLDP) Configure and verify (Layer
2/Layer 3) EtherChannel (LACP)
Describe the need for and basic operations of Rapid PVST+ Spanning Tree Protocol and identify
basic operations
Root port, root bridge (primary/secondary), and other port names
Port states (forwarding/blocking)
PortFast benefits
Compare Cisco Wireless Architectures and AP modes
Describe physical infrastructure connections of WLAN components (AP, WLC, access/trunk
ports, and LAG)
Describe AP and WLC management access connections (Telnet,
SSH, HTTP, HTTPS, console,and TACACS+/RADIUS)
Configure the components of a wireless LAN access for client connectivity using GUI only
such as WLAN creation, security settings, QoS profiles, and advanced WLAN settings
3.0 IP Connectivity
Interpret the components of routing table
Routing protocol code
Prefix
Network mask
Next hop
Administrative distance
Metric
Gateway of last resort
12. Module 16- Hacking Wireless Networks
www.scodenetwork.com
Determine how a router makes a forwarding decision by default
Longest match
Administrative distance
Routing protocol metric
Configure and verify IPv4 and IPv6 static routing
Default route
Network route
Host route
Floating static
13. Module 20- Cryptography
www.scodenetwork.com
Configure and verify single area OSPFv2 3.4.a Neighbor
adjacencies
Point-to-point
Broadcast (DR/BDR selection)
Router ID
Describe the purpose of first hop redundancy protocol
4.0 IP Services
Configure and verify inside source NAT using static and pools
Configure and verify NTP operating in a client and server mode
Explain the role of DHCP and DNS within the network
Explain the function of SNMP in network operations
Describe the use of syslog features including facilities and levels
Configure and verify DHCP client and relay
Explain the forwarding per-hop behavior (PHB) for QoS such as classification,
marking, queuing,congestion, policing, shaping
Configure network devices for remote access using SSH
Describe the capabilities and function of TFTP/FTP in the network
5.0 Security Fundamentals
Define key security concepts (threats, vulnerabilities, exploits, and mitigation
techniques)
Describe security program elements (user awareness, training, and physical access
control)
Configure device access control using local passwords
Describe security password policies elements, such as management,
complexity, and passwordalternatives (multifactor authentication, certificates,
and biometrics)
Describe remote access and site-to-site VPNs
Configure and verify access control lists
Configure Layer 2 security features (DHCP snooping, dynamic ARP inspection, and
port security)
Differentiate authentication, authorization, and accounting concepts
Describe wireless security protocols (WPA, WPA2, and WPA3)
Configure WLAN using WPA2 PSK using the GUI
6.0 Automation and Programmability
Explain how automation impacts network management
Compare traditional networks with controller-based networking
Describe controller-based and software defined architectures (overlay, underlay,
and fabric)
Separation of control plane and data plane
North-bound and south-bound APIs
14. Module 20- Cryptography
www.scodenetwork.com
Compare traditional campus device management with
Cisco DNA Center enabled devicemanagement
Describe characteristics of REST-based APIs (CRUD, HTTP verbs, and data encoding)
Recognize the capabilities of configuration management mechanisms Puppet, Chef, and
AnsibleInterpret JSON encoded data