CPD UK Cyber security certification program

Protect, defend, and secure with the industry-leading Cyber Security program, empowering you to stay one step ahead of threats.

4.3 (350+) Ratings
300k+ Trained Cyber Security

Course Overview

The CPD UK Cyber Security Certification Program is a comprehensive
course designed to equip participants with the knowledge and skills to
combat modern cybersecurity threats.

The program offers hands-on training and real-world simulations to
enhance practical expertise.

Upon completion, participants will receive a prestigious CPD UK
certification, validating their expertise in Cyber Security.

Curriculum

Module-1 Introduction to Ethical Hacking                                                                           

What is Ethical Hacking
Types of Hackers
ENGING Security Challenges Scanning
Who is a Hacker
Skills required for an Ethical Hacker
Types of Attacks sypes
What do Ethical Hackers Do
Vulnerability Research Effects of Hacking
How can Hacking be Ethical
Types of Data Stolen from the organisation
What is Penetration Testing

Module-2 Networking Concept                                                                                                  

How does internet work.
What is network?
Countermeasures of network.
What is IP and types of IP?
What is Mac?
What is Cookie and Cache?
Domain Name System o Name Server
Electronic Mail
Architecture and Services
Mail Access Protocols
Introduction of Ports
Introduction to Web Browser

Module-3 Kali Linux                                                                                                                       

Kali Linux basics and setup
Bootable pendrives and virtualisation         
Accessing the command line log into a linux system and run simple commands in shell
Managing files from command line-copy, move, create, delete
Create, view and edit text files using editor
Control -set different permission settings on files linux file system permissions
Monitor and manage Linux processes         
Setting up a proxy server on linux  
Uploading website and playing with apache server                                            

Module-4 Operating System Concept - Part I                                                                        

Introduction to Operating System
Types of Operating System Bootstrapping Technology
Understanding Windows
Understanding Tokens
Impersonation Tokens

Module-5 Operating System Concept - Part II                                                                       

Introduction to Linux
Introduction to Kali
Introduction to metasploit framework
Downloading and running exploit

Module-6 Virtualisation                                                                                                                  

Creating Virtual OS on system
Creating bootable pendrive Installation of virtual operating system

Module-7 Footprinting                                                                                                                     

Footprinting Terminologies
People Search
DNS Lookup
Tracking Users
Tracking Emails Communications
Tracking Mobile Communications
Mobile Communications Countermeasures

Module-8 Scanning Network                                                                                                           

Network Scanning
Three Way Handshake
TCP Communication Flags
Hping Commands
Scanning Techniques
Seaching Vulnerable Systems
Operating System Fingerprinting
Complete Study on Banner Grabbing
Vulnerability Scanning
Proxy Servers
Proxy Tools

Module-9 Enumeration                                                                                                                          

What is enumeration
Techniques for Enumeration
Services and ports to enumerate
Netbios Enumeration
Enumerate system using Default Password
SNMP enumeration
Unix/Linux Enumeration
LDAP Enumeration
NTP Enumeration
SMTP Enumeration
DNS Enumeration

Module-10 System Hacking                                                                                                                     

System Hacking: Goals
CCAS Hacking Methodology
Windows Hacking
Wifi Hacking and Security

Module-11 Smart phone hacking and security                                                                                

Android phone hacking
Creating rat in kali
Installing rat in smart phone
Application binding with rat

Module-12 Passwords Breaking                                                                                                            

Password Cracking
Password Complexity
Password Cracking Techniques
Types of Password Attacks
Microsoft Authentication
How Hash Passwords are Stored in Windows SAM?
PWdump7 and Fgdump
Rar file password breaking
Doc, PDF file password breaking
John the ripper
Cain & Abel
Detail Study on Password Cracking Tools

Module-13 Keylogger                                                                                                                                

Keylogger
Types of Keystroke Loggers
Detail Study on Keyloggers and Spywares
AntiKeyloggers
Spyware
Types of Spyware
USB Spyware
Audio Spyware
Email or internet Spyware
Antispyware

Module-14 Steganography                                                                                                                        

What is Steganography
Steganography Techniques
How Steganography Works
Types of Steganography
Methods of Steganography
Steganography Detection Tools

Module-15 Cryptography                                                                                                                          

Cryptography
Types of Cryptography
Cryptography Techniques
What is SSH
Cryptography Tools
Cryptography Attacks
Code Breaking Methodologies

Module-16 Cyber Crime Investigation                                                                                             

Introduction to Cyber Crime Investigation.
Types of Cyber Crimes.
Report Cyber Crimes.
Investigating Emails (Email Tracing)
Email header analysis
Online email header analysis.
Investigating Phishing Cases.
Investigating Data Theft Cases.
Investigating Social Profile Impersonation Cases.
Cyber Law & IT Act, 2000/2008

Module-17 Introduction to Python                                                                                                    

Section 1– Overview

SECURITY Introduction to python
Why to Learn python
Characteristics of python
Applications of python
Python features
Installing & Using Python IDE

Python Section-2 Basics                                                                                                                         

Python setup
Different Modes of Programming
Python Identifiers
Lines and Indentation
Multi-Line Statements
Quotation in python
Comments

Python Section-3 Introduction to Variables                                                                                    

What are Variables?
Assigning Values to Variables
Introduction to Data Types

Python Section-4 Introduction to Operators                                                                                   

What are Operators?
Types of Operators
Playing with Operators

Python Section-5 Decision making statements                                                                              

What is decision making statement & how they work?
If Statements
If else statements
Nested if statements

Python Section-6 Loops                                                                                                                           

What are Variables?
Assigning Values to Variables
Introduction to Data Types

Python Section-7 Working More with Data Types                                                                           

Strings
Lists
Dictionary
Tuples

Python Section-8 Functions                                                                                                                      

What is a function?
Defining & Calling a Function
Pass By Reference
Function Arguments
Return Statements
Global vs Local variables

Python Section-9 Files I/O                                                                                                                         

Reading Keyboard Input
Opening and Closing Files
Reading and Writing Files
Renaming and Deleting Files

Python Section-10 Exceptions Handling                                                                                               

What is Exception?
Handling an Exception
Try-except clause
Try-finally clause
Raising an Exception
User-Defined Exceptions

List Of Projects

Network Vulnerability Scanner
Malware Analysis Tool Web Application
Password Manager
Secure Chat Application
Tool Web Application Firewall
Phishing Awareness Platform

Professional Certification

Enhance Your Employability and Recognition by Combining your degree and experience with success
in the Data Science Institute’s Industry Recognised and Approved Professional Certifications.

Why You Should Choose ACODS?

METAFISER LMS Portal

World-Class Instructors
Expert-Led Mentoring Sessions
Instant doubt clearing

 100+ Live Hours

Course Access Never Expires
Free Access to Future Updates
Unlimited Access to Course Content

7 Months Program

One-On-One Learning Assistance
Help Desk Support
Resolve Doubts in Real-time

 Live 1 to 1 Mentorship

Industry-Relevant Projects
Course Demo Dataset & Files
Quizzes & Assignments

 300+ Hiring partners

CPD UK Certificate
Project Certificate of Metafiser
Metafiser Certificate of Completion

CPD UK Certification

CPD UK Certificate
Project Certificate of Metafiser
METAFISER Certificate of Completion

Online Portfolio Builder

To showcase your projects via GitHub, Kaggle, and many more

Job Assistance

Profile Analysis of an Individual to Assist them in Placement

 Mock interviews

To Perform well and Boost your Confidence in Interviews

JOB PROFILES

Cybersecurity Analyst
Forensic Analyst
Risk Analyst
Cybersecurity Architect
Security Consultant
Penetration Tester (Ethical Hacker)
Malware Analyst
Security Architect
Vulnerability Analyst

ALUMNI NETWORK

Advisory Board

Expert-in
Java, Spring, REST, Data Engineering, Big Data, Hadoop, Spark, Kafka, No SQL, Apache-airflow, AZURE,AWS System Designing, Redis, Postgres, hibernates, Open source technologies
Expert-in
AWS, Spark, Scala, Python, Java, Big Data, Kafka, NO SQL, SQL, Performance optimization, Flume, ELK, Kubernetes, Kafka
Expert-in
Data Engineering, AI-ML, SQL, MLOPS, Big Data, Hadoop, Spark, Kafka, No SQL, Apache-airflow, AWS, GCP, Scala
Expert-in
Java, Spring, REST, Data Engineering, Big Data, Hadoop, Spark, Kafka, No SQL, Apache-airflow, AZURE,AWS System Designing, Redis, Postgres, hibernates, Open source technologies
Expert-in:
ML, Spark, Hadoop, Snowflake, RDBMS, NoSQL, AWS, Java, Scala and Python
Expert-in:
Microsoft Power-BI, Tableau, pySpark, Big Data, Python, SQL, Deep Learning, ML Algorithms, Automation ,Data Analysis.
Expert-in:
AI-ML, Data Engineering, Big Data, Hadoop, Spark, Kafka, No SQL, Apache-airflow, AZURE, AWS, System Designing, Kubernetes,Memchange

Our Media Coverage

Read learner testimonials

4.9

Google Reviews

Reviews on Google