QDCS (QUIK DIPLOMA IN CYBER SECURITY)

Government of India has mentioned that India alone needs 5 Lakh Cyber security professionals. There is huge gap in demand and supply. People who have hands-on experience on cyber security are few and the organizations are taking them with open hands. They are paid well and growth is fast.

QDCS, is the most advanced Cyber Security course for freshers and IT security professionals. It covers every aspect of Cyber Security, which is the need of the market. It had been designed by experts and after understanding the needs of the IT Security industry. This Diploma will enable you to pursue a brilliant career in IT security, globally.

SEMESTER 1:

FOUNDATION COURSE (NETWORKING & IT SECURITY)

NETWORK BASICS 

  • What Is A Network
  • Types Of Network
  • Networking Devices Basics
  • TCP/IP & Other Networking Protocols
  • Types Of Ports

UNDERSTANDING OPERATING SYSTEMS

  • Introduction To Windows Operating Systems
  • Windows Security Architecture
  • Remote Assistance/Remote Desktop
  • Network Configuration
  • Best Security Practices
  • Vmware Basics & Configuration
  • Web Server Basics & Configuration
  • Overview Of Backtrack 5 R3

UNDERSTANDING SECURITY COMPONENTS

  • Overview – Firewalls
  • Overview – IDS/IPS
  • Overview- Antivirus
  • Wi-Fi Basic Security
  • Cyber Threats
  • Types Of Hackers
  • Legal Considerations

 

EC COUNCIL – CERTIFIED NETWORK DEFENDER (NETWORK SECURITY)

  • Computer Network & Defense Fundamentals
  • Network Security Vulnerabilities & Attacks
  • Hardening firewall, IDS, VPN
  • Disaster recovery
  • Incident Handling
  • Risk and Vulnerability management
  • Network Security controls, Protocols & Devices
  • Physical Security
  • Host Security
  • Wireless Network Defense
  • Data Backup & Recovery
  • Network Incidence Response & Management
  • Network Traffic Monitoring & Analysis

SEMESTER 2

EC COUNCIL – CERTIFIED ETHICAL HACKER (CEH)

  • Introduction to Ethical Hacking
  • Foot-printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Cloud Computing
  • Cryptography

SEMESTER 3

EC COUNCIL CERTIFIED SECURITY ANALYST (ECSA)

  • Security Analysis and Penetration Testing Methodologies
  • TCP IP Packet Analysis
  • Pre-penetration Testing Steps
  • Information Gathering Methodology
  • Vulnerability Analysis
  • External Network Penetration Testing Methodology
  • Internal Network Penetration Testing Methodology
  • IDS Penetration Testing Methodology
  • Web Application Penetration Testing Methodology
  • SQL Penetration Testing Methodology
  • Database Penetration Testing Methodology
  • Wireless Network Penetration Testing Methodology
  • Mobile Devices Penetration Testing Methodology
  • Report Writing and Post Test Actions Password Cracking Penetration Testing
  • Router and Switches Penetration Testing
  • Denial-of-Service Penetration Testing
  • Physical Security Penetration Testing
  • Firewall Penetration Testing Methodology
  • VPN Penetration Testing
  • Virtual Machine Penetration Testing
  • Virus and Trojan Detection
  • Log Management Penetration Testing
  • File Integrity Checking
  • Email Security Penetration Testing
  • Security Patches Penetration Testing
  • Data Leakage Penetration Testing
  • Standards and Compliance
  • Information System Security Principles
  • Information System Incident Handling and Response
  • Information System Auditing and Certification

SEMESTER 4

EC COUNCIL- COMPUTER HACKING FORENSIC INVESTIGATOR (CHFI)

  • Computer Forensics in Today’s World
  • Computer Forensics Investigation Process
  • Understanding Hard Disks and File Systems
  • Operating System Forensics
  • Defeating Anti-Forensics Techniques
  • Data Acquisition and Duplication
  • Network Forensics
  • Investigating Web Attacks
  • Database Forensics
  • Cloud Forensics
  • Malware Forensics
  • Investigating Email Crimes
  • Mobile Forensics
  • Investigative Reports

 

ALL THE COURSES, EXCEPT NETWORKING WILL BE FOLLOWED BY ONLINE EXAM (GLOBAL CERTIFICATION)

Share the project

More...