Protect, defend, and secure with the industry-leading Cyber Security program, empowering you to stay one step ahead of threats.
The CPD UK Cyber Security Certification Program is a comprehensive
course
designed to equip participants with the knowledge and skills to
combat modern cybersecurity
threats.
The program offers hands-on training and real-world simulations to
enhance
practical expertise.
Upon completion, participants will receive a prestigious CPD
UK
certification, validating their expertise in Cyber Security.
What is Ethical Hacking
Types of Hackers
ENGING
Security Challenges Scanning
Who is a Hacker
Skills required for an Ethical
Hacker
Types of Attacks sypes
What do Ethical Hackers Do
Vulnerability
Research Effects of Hacking
How can Hacking be Ethical
Types of Data Stolen from
the organisation
What is Penetration Testing
How does internet work.
What is
network?
Countermeasures of network.
What is IP and types of IP?
What is
Mac?
What is Cookie and Cache?
Domain Name System o Name Server
Electronic
Mail
Architecture and Services
Mail Access Protocols
Introduction of
Ports
Introduction to Web Browser
Kali Linux basics and setup
Bootable pendrives and
virtualisation
Accessing the command line log into a linux system and run
simple commands in shell
Managing files from command line-copy, move, create,
delete
Create, view and edit text files using editor
Control -set different
permission settings on files linux file system permissions
Monitor and manage Linux
processes
Setting up a proxy server on linux
Uploading website and
playing with apache server
Introduction to Operating System
Types of Operating System
Bootstrapping Technology
Understanding Windows
Understanding
Tokens
Impersonation Tokens
Introduction to Linux
Introduction to
Kali
Introduction to metasploit framework
Downloading and running exploit
Creating Virtual OS on system
Creating bootable pendrive
Installation of virtual operating system
Footprinting Terminologies
People Search
DNS
Lookup
Tracking Users
Tracking Emails Communications
Tracking Mobile
Communications
Mobile Communications Countermeasures
Network Scanning
Three Way Handshake
TCP Communication
Flags
Hping Commands
Scanning Techniques
Seaching Vulnerable
Systems
Operating System Fingerprinting
Complete Study on Banner
Grabbing
Vulnerability Scanning
Proxy Servers
Proxy Tools
What is enumeration
Techniques for
Enumeration
Services and ports to enumerate
Netbios Enumeration
Enumerate
system using Default Password
SNMP enumeration
Unix/Linux Enumeration
LDAP
Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration
System Hacking: Goals
CCAS Hacking Methodology
Windows
Hacking
Wifi Hacking and Security
Android phone hacking
Creating rat in kali
Installing
rat in smart phone
Application binding with rat
Password Cracking
Password Complexity
Password
Cracking Techniques
Types of Password Attacks
Microsoft Authentication
How
Hash Passwords are Stored in Windows SAM?
PWdump7 and Fgdump
Rar file password
breaking
Doc, PDF file password breaking
John the ripper
Cain &
Abel
Detail Study on Password Cracking Tools
Keylogger
Types of Keystroke Loggers
Detail Study on
Keyloggers and Spywares
AntiKeyloggers
Spyware
Types of Spyware
USB
Spyware
Audio Spyware
Email or internet Spyware
Antispyware
What is Steganography
Steganography Techniques
How
Steganography Works
Types of Steganography
Methods of
Steganography
Steganography Detection Tools
Cryptography
Types of Cryptography
Cryptography
Techniques
What is SSH
Cryptography Tools
Cryptography Attacks
Code
Breaking Methodologies
Introduction to Cyber Crime Investigation.
Types of Cyber
Crimes.
Report Cyber Crimes.
Investigating Emails (Email Tracing)
Email
header analysis
Online email header analysis.
Investigating Phishing
Cases.
Investigating Data Theft Cases.
Investigating Social Profile Impersonation
Cases.
Cyber Law & IT Act, 2000/2008
Section 1– Overview
SECURITY Introduction to
python
Why to Learn python
Characteristics of python
Applications of
python
Python features
Installing & Using Python IDE
Python setup
Different Modes of Programming
Python
Identifiers
Lines and Indentation
Multi-Line Statements
Quotation in
python
Comments
What are Variables?
Assigning Values to
Variables
Introduction to Data Types
What are Operators?
Types of Operators
Playing with
Operators
What is decision making statement & how they work?
If
Statements
If else statements
Nested if statements
What are Variables?
Assigning Values to
Variables
Introduction to Data Types
Strings
Lists
Dictionary
Tuples
What is a function?
Defining & Calling a
Function
Pass By Reference
Function Arguments
Return Statements
Global
vs Local variables
Reading Keyboard Input
Opening and Closing
Files
Reading and Writing Files
Renaming and Deleting Files
What is Exception?
Handling an Exception
Try-except
clause
Try-finally clause
Raising an Exception
User-Defined Exceptions
Enhance Your Employability and Recognition by Combining your degree and experience
with success
in the Data Science Institute’s Industry Recognised and Approved Professional
Certifications.
World-Class Instructors
Expert-Led Mentoring Sessions
Instant doubt
clearing
Course Access Never Expires
Free Access to Future Updates
Unlimited Access
to Course Content
One-On-One Learning Assistance
Help Desk Support
Resolve Doubts in
Real-time
Industry-Relevant Projects
Course Demo Dataset & Files
Quizzes &
Assignments
CPD UK Certificate
Project Certificate of Metafiser
Metafiser Certificate
of Completion
CPD UK Certificate
Project Certificate of Metafiser
METAFISER Certificate
of Completion
To showcase your projects via GitHub, Kaggle, and many more
Profile Analysis of an Individual to Assist them in Placement
To Perform well and Boost your Confidence in Interviews