ISCP - Information Security Certified Professional
- Offered byKraftshala
ISCP - Information Security Certified Professional at Kraftshala Overview
Duration | 60 hours |
Total fee | ₹44,990 |
Mode of learning | Online |
Credential | Certificate |
ISCP - Information Security Certified Professional at Kraftshala Highlights
- Practical learning on real time projects
- Get hands-on-experience on these projects with the best testing tools
ISCP - Information Security Certified Professional at Kraftshala Course details
- A thorough understanding of all critical components of Information Security
- Comprehensive demonstration of ethical security behaviour
- State-of-the-art study pattern for risk analysis and mitigation
- Enumerated study on different phases of security systems development life cycle
- By doing ISCP course, student will learn all modules of information security to the advanced level
- ISCP is a complete Cyber Security Course including all the 20 modules of Cyber Security and gives more practical learning with certification exam
- It allows to understand the advanced concepts of hacking, cyber security and security assessment in a simple and logical manner
- It will help to jump start career in IT security.
- Student may then directly land jobs in various MNCs or start their own consulting business.
- The course registration fees is 1999/-
ISCP - Information Security Certified Professional at Kraftshala Curriculum
Introduction to Cyber Security
What is Cyber Security
Statistics and Inferences
Need of Cyber Security
Common Terminologies
Career and Growth
Threats to the Cyber World
Hacking Phases
Skills of an Ethical hacker
Cyber Laws and Compliances
Cyber Crimes
Statistics of Cyber Crime
Cyber Laws
Case Studies
Recent Cyber Crimes around the world
How to Report Cyber Crimes
Recent Initiatives in India
Security Compliances
Basics of Networking
Introduction
How Computer Network Works
Networking Components
Naming, Addressing & Forwarding
Subnetting
Networking Devices
Application Layer
Transport Layer
Internet Layer
Link Layer
Other Protocols
Cryptography
Introduction
Definition of terms
Objectives of Cryptography
Types of Attacks
Introduction to Cryptosystems
Encryption
Modern Ciphers
Cost Benefit Approach
Introduction to Symmetric key cryptography
Types of Symmetric Key Cryptography
Asymmetric Key Cryptography
Hashing
Cryptographic Protocols
Cryptographic Tools
Cryptographic Attacks
Footprinting
Introduction
Need of Footprinting
Targets of Footprinting IT
Footprinting Techniques
Conclusion
Network Scanning (Probing)
Introduction
Types of scanning
Objectives of scanning techniques
Port Scanning Techniques
Port scanner tools
Vulnerability Scanning
Determining Network Architecture
Conclusion
Spoofing
Introduction
Objectives of Spoofing
Types of Spoofing
Impact of spoofing
Legal issues
Counter Measures
System Hacking
Introduction to Operating System
Basic function & process
Windows
Linux
Mac Hacking
User centered Attacks
Conclusion
Web Application Security- Part 1
Web Application Basics
Passive Information Gathering
Web Application Security- Part 2
Active Information Gathering
Check authentication mechanism
Web Application Security- Part 3
Vulnerability in Authorization Mechanism
Injection Attacks
Web Application Security- Part 4
Web Application Vulnerabilities and its Defences
Web Application Security- Part 5
Web Application Security Scanner
Injection 1
SQL Injection
LDAP Injection
ORM Injection
XML Injection
SSI Injection
Injection Attacks
XPath Injection
Injection 2
IMAP/SMTP Injection
Code Injection
File inclusion vulnerabilities
Command Injection
How to prevent SQL Injection
Conclusion
Pentesting
Introduction
Penetration testing
Vulnerability Assessment vs Penetration testing
Legal Authority
Importance of Penetration testing
Advantages of Pentesting
Method of pentesting
Penetration Testing Execution Standard
Stages of pentesting
Reporting
Introduction to ISCP Grade 2
Mobile Application
Web Server Hacking
Firewall, IDS and IPS
Malwares
Denial of Service Attacks
Wireless Security
Social Engineering
Cloud Security
IoT Security
Mobile Application
Introduction
Interaction with an Android Device
Andriod Network Analysis
Android APK Reverse Engineering
Android Application Pen-testing
Vulnerabilities in Android
Rooting Android Devices
Android Hacking tools
Android Security Tool DroidSheep
IOS Hacking Devices
Hacking Windows Phone OS
Web Server Hacking
Introduction
What is WebServer and its architecture?
Type of WebServer
Impact of WebServer Attacks
Compromised use details
Information Gathering for DNS related information
Tools used
Scanning
Tool
Nmap
Gaining Access
Attacks
SMTP Relay
Website Mirroring
Man-in-middle-attack
Http response splitting attack
Privilege Escalation
Metasploit
Countermeasure
System Hardening
Windows
Linux
Mac
Buffer Overflows - Part 1
Buffer Overflows - Part 2
Firewall, IDS and IPS
Introduction
Types of firewall
Firewall implementation
Unified threat management
Evading Firewalls
Firewall Identification
IP Address Spoofing
Source Routing
Tiny Fragments
Bypass Blocked Sites Using IP Address in Place of URL
Bypass Blocked Sites Using Anonymous Website Surfing Sites
Bypass a Firewall Using Proxy Server
Bypassing Firewall through ICMP Tunnelling Method
Bypassing Firewall through ACK Tunnelling Method
Bypassing Firewall through HTTP Tunnelling Method
Bypassing Firewall through SSH Tunnelling Method
Bypassing Firewall through External Systems
Bypassing Firewall through MITM Attack
Bypassing Firewall through Content
Intrusion Detection System
Intrusion Prevention System
Honeypots
Network Security Auditing
Malwares
Introduction
Statistics of Malware Infection
Type of malwares
Malware Economy
Impact of Malware Infections
Countermeasures
Conclusion
Denial of Service Attacks
Introduction to DoS
DDoS attacks
Statistics related to DoS
Types of DDoS attacks
Sources & tools of DDoS
Detection of DoS Attacks
Mitigation Strategies
Unintentional DoS
Economics of DoS
Impact of DoS
Wireless Security
Introduction to Wireless Networks
Introduction to 802.11WLAN Protocols
Basic concepts
Wireless attack scenarios
Bypassing WLAN Authentication
Cracking WEP Wi-Fi networks
Cracking WPA/WPA2 Wi-Fi networks
Client Side Wi-Fi Attacks
Man in the Middle Attack
Wireless Penetration testing
Conclusion
Router Penetration Testing
Social Engineering
Factors that make companies
Warning signs of attack
Phases in a social engineering attack
Common targets of social engineering
Human Based Social engineering
Computer based social engineering
Mobile based social engineering
Insider Attack
Preventing Insider threats
Masquerading on Social Networking
Identity Theft
Social engineering Countermeasures
How to detect phishing emails
Identity Theft Countermeasures
Cloud Security
Introduction
Deployment model
Categories of Cloud Computing
Cloud Computing Benefits
Information Management and Data
Interoperability and Portability
Cloud Security Models
Cloud Security
Cloud Security Tools
Limitations of Cloud
Privacy and Security Concerns
Conclusion
IoT Security
Introduction to IoT
Technical Overview of IoT
Security of IoT Devices
Use of IoT
Challenges in IoT
Conclusion