Kraftshala
Kraftshala Logo

ISCP - Information Security Certified Professional 

  • Offered byKraftshala

ISCP - Information Security Certified Professional
 at 
Kraftshala 
Overview

Duration

60 hours

Total fee

44,990

Mode of learning

Online

Credential

Certificate

ISCP - Information Security Certified Professional
 at 
Kraftshala 
Highlights

  • Practical learning on real time projects
  • Get hands-on-experience on these projects with the best testing tools
Details Icon

ISCP - Information Security Certified Professional
 at 
Kraftshala 
Course details

What are the course deliverables?
  • A thorough understanding of all critical components of Information Security
  • Comprehensive demonstration of ethical security behaviour
  • State-of-the-art study pattern for risk analysis and mitigation
  • Enumerated study on different phases of security systems development life cycle
More about this course
  • By doing ISCP course, student will learn all modules of information security to the advanced level
  • ISCP is a complete Cyber Security Course including all the 20 modules of Cyber Security and gives more practical learning with certification exam
  • It allows to understand the advanced concepts of hacking, cyber security and security assessment in a simple and logical manner
  • It will help to jump start career in IT security.
  • Student may then directly land jobs in various MNCs or start their own consulting business.
  • The course registration fees is 1999/-

ISCP - Information Security Certified Professional
 at 
Kraftshala 
Curriculum

Introduction to Cyber Security

What is Cyber Security

Statistics and Inferences

Need of Cyber Security

Common Terminologies

Career and Growth

Threats to the Cyber World

Hacking Phases

Skills of an Ethical hacker

Cyber Laws and Compliances

Cyber Crimes

Statistics of Cyber Crime

Cyber Laws

Case Studies

Recent Cyber Crimes around the world

How to Report Cyber Crimes

Recent Initiatives in India

Security Compliances

Basics of Networking

Introduction

How Computer Network Works

Networking Components

Naming, Addressing & Forwarding

Subnetting

Networking Devices

Application Layer

Transport Layer

Internet Layer

Link Layer

Other Protocols

Cryptography

Introduction

Definition of terms

Objectives of Cryptography

Types of Attacks

Introduction to Cryptosystems

Encryption

Modern Ciphers

Cost Benefit Approach

Introduction to Symmetric key cryptography

Types of Symmetric Key Cryptography

Asymmetric Key Cryptography

Hashing

Cryptographic Protocols

Cryptographic Tools

Cryptographic Attacks

Footprinting

Introduction

Need of Footprinting

Targets of Footprinting IT

Footprinting Techniques

Conclusion

Network Scanning (Probing)

Introduction

Types of scanning

Objectives of scanning techniques

Port Scanning Techniques

Port scanner tools

Vulnerability Scanning

Determining Network Architecture

Conclusion

Spoofing

Introduction

Objectives of Spoofing

Types of Spoofing

Impact of spoofing

Legal issues

Counter Measures

System Hacking

Introduction to Operating System

Basic function & process

Windows

Linux

Mac Hacking

User centered Attacks

Conclusion

Web Application Security- Part 1

Web Application Basics

Passive Information Gathering

Web Application Security- Part 2

Active Information Gathering

Check authentication mechanism

Web Application Security- Part 3

Vulnerability in Authorization Mechanism

Injection Attacks

Web Application Security- Part 4

Web Application Vulnerabilities and its Defences

Web Application Security- Part 5

Web Application Security Scanner

Injection 1

SQL Injection

LDAP Injection

ORM Injection

XML Injection

SSI Injection

Injection Attacks

XPath Injection

Injection 2

IMAP/SMTP Injection

Code Injection

File inclusion vulnerabilities

Command Injection

How to prevent SQL Injection

Conclusion

Pentesting

Introduction

Penetration testing

Vulnerability Assessment vs Penetration testing

Legal Authority

Importance of Penetration testing

Advantages of Pentesting

Method of pentesting

Penetration Testing Execution Standard

Stages of pentesting

Reporting

Introduction to ISCP Grade 2

Mobile Application

Web Server Hacking

Firewall, IDS and IPS

Malwares

Denial of Service Attacks

Wireless Security

Social Engineering

Cloud Security

IoT Security

Mobile Application

Introduction

Interaction with an Android Device

Andriod Network Analysis

Android APK Reverse Engineering

Android Application Pen-testing

Vulnerabilities in Android

Rooting Android Devices

Android Hacking tools

Android Security Tool DroidSheep

IOS Hacking Devices

Hacking Windows Phone OS

Web Server Hacking

Introduction

What is WebServer and its architecture?

Type of WebServer

Impact of WebServer Attacks

Compromised use details

Information Gathering for DNS related information

Tools used

Scanning

Tool

Nmap

Gaining Access

Attacks

SMTP Relay

Website Mirroring

Man-in-middle-attack

Http response splitting attack

Privilege Escalation

Metasploit

Countermeasure

System Hardening

Windows

Linux

Mac

Buffer Overflows - Part 1

Buffer Overflows - Part 2

Firewall, IDS and IPS

Introduction

Types of firewall

Firewall implementation

Unified threat management

Evading Firewalls

Firewall Identification

IP Address Spoofing

Source Routing

Tiny Fragments

Bypass Blocked Sites Using IP Address in Place of URL

Bypass Blocked Sites Using Anonymous Website Surfing Sites

Bypass a Firewall Using Proxy Server

Bypassing Firewall through ICMP Tunnelling Method

Bypassing Firewall through ACK Tunnelling Method

Bypassing Firewall through HTTP Tunnelling Method

Bypassing Firewall through SSH Tunnelling Method

Bypassing Firewall through External Systems

Bypassing Firewall through MITM Attack

Bypassing Firewall through Content

Intrusion Detection System

Intrusion Prevention System

Honeypots

Network Security Auditing

Malwares

Introduction

Statistics of Malware Infection

Type of malwares

Malware Economy

Impact of Malware Infections

Countermeasures

Conclusion

Denial of Service Attacks

Introduction to DoS

DDoS attacks

Statistics related to DoS

Types of DDoS attacks

Sources & tools of DDoS

Detection of DoS Attacks

Mitigation Strategies

Unintentional DoS

Economics of DoS

Impact of DoS

Wireless Security

Introduction to Wireless Networks

Introduction to 802.11WLAN Protocols

Basic concepts

Wireless attack scenarios

Bypassing WLAN Authentication

Cracking WEP Wi-Fi networks

Cracking WPA/WPA2 Wi-Fi networks

Client Side Wi-Fi Attacks

Man in the Middle Attack

Wireless Penetration testing

Conclusion

Router Penetration Testing

Social Engineering

Factors that make companies

Warning signs of attack

Phases in a social engineering attack

Common targets of social engineering

Human Based Social engineering

Computer based social engineering

Mobile based social engineering

Insider Attack

Preventing Insider threats

Masquerading on Social Networking

Identity Theft

Social engineering Countermeasures

How to detect phishing emails

Identity Theft Countermeasures

Cloud Security

Introduction

Deployment model

Categories of Cloud Computing

Cloud Computing Benefits

Information Management and Data

Interoperability and Portability

Cloud Security Models

Cloud Security

Cloud Security Tools

Limitations of Cloud

Privacy and Security Concerns

Conclusion

IoT Security

Introduction to IoT

Technical Overview of IoT

Security of IoT Devices

Use of IoT

Challenges in IoT

Conclusion

ISCP - Information Security Certified Professional
 at 
Kraftshala 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Kraftshala

14 K
15 weeks
– / –
– / –
7 months
– / –
1.52 L
7 months
– / –
View Other 1 CoursesRight Arrow Icon
qna

ISCP - Information Security Certified Professional
 at 
Kraftshala 

Student Forum

chatAnything you would want to ask experts?
Write here...