Iscp Training in Mumbai | Kratikal Academy | Cybersecurity Academy in Ahmedabad
Lecture 60-80
Duration 80 Hrs
Skill Level Basic
Language English
Assessments Certification Exam
ISCP course is an 80-hour instructor lead training and practical based certification course. It assumes minimal understanding of the IT system, on the trainees’ part, teaching them advanced concepts of hacking, cyber security and security assessment in a simple and logical manner. Live practical scenarios and demonstrations help in clear understanding of the topics. It will help you to jump start your career in IT security. You may then directly land jobs in various MNCs or start your own consulting business.
Takeaways for the students.

Industry recognized certification as "Information Security Certified Professional."
Training under Kratikal Certified Instructor.
Live security testing (VA)
projects under Kratikal.
Course Material, Video, Lectures
and DVD toolkit.
Regular assessments and
skill checks.
Lifetime access to E-learning
portal.
Placement assistance in reputed companies.
Lifetime access to job portal.
  • What is Cyber Security
  • Statistics and Inferences
  • Need of Cyber Security
  • Common Terminologies
  • Career and Growth
  • Threats to the Cyber World
  • Hacking Phases
  • Skills of an Ethical hacker
  • Cyber Crimes
  • Statistics of Cyber Crime
  • Cyber Laws
  • Case Studies
  • Recent Cyber Crimes around the world
  • How to Report Cyber Crimes
  • Recent Initiatives in India
  • Security Compliances
  • Introduction
  • How computer Network Works
  • Networking Components
  • Naming, Addressing & Forwarding
  • Subnetting
  • Networking Devices
  • Application Layer
  • Transport Layer
  • Internet Layer
  • Link Layer
  • Other Protocols
  • Introduction
  • Definition of terms
  • Objectives of Cryptography
  • Types of Attacks
  • Introduction to Cryptosystems
  • Encryption
  • Modern Ciphers
  • Cost Benefit Approach
  • Introduction to Symmetric key cryptography
  • Types of Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Hashing
  • Cryptographic Protocols
  • Cryptographic Tools
  • Cryptographic Attacks
  • Introduction
  • Need of Footprinting
  • Targets of Footprinting IT
  • Footprinting Techniques
  • Conclusion
  • Introduction
  • Types of scanning
  • Objectives of scanning techniques
  • Port Scanning Techniques
  • Port scanner tools
  • Vulnerability Scanning
  • Determining Network Architecture
  • Conclusion
  • Introduction
  • Objectives of Spoofing
  • Types of Spoofing
  • Impact of spoofing
  • Legal issues
  • Counter Measures
  • Introduction to Operating System
  • Basic function & process
  • Windows
  • Linux
  • Mac Hacking
  • User centered Attacks
  • Conclusion
  • Web Application Basics
  • Pasive Information Gathering
  • Active Information Gathering
  • Check authentication mechanism
  • Vulnerability in Authorization Mechanism
  • Injection Attacks
  • Web Application Vulnerabilities and its Defences
  • Web Application Security Scanner
  • SQL Injection
  • LDAP Injection
  • ORM Injection
  • XML Injection
  • SSI Injection
  • Injection Attacks
  • XPath Injection
  • IMAP/SMTP Injection
  • Code Injection
  • File inclusion vulnerabilities
  • Command Injection
  • How to prevent SQL Injection
  • Conclusion
  • Introduction
  • Interaction with an Android Device
  • Andriod Network Analysis
  • Android APK Reverse Engineering
  • Android Application Pen-testing
  • Vulnerabilities in Android
  • Rooting Android Devices
  • Android Hacking tools
  • Android Security Tool DroidSheep
  • IOS Hacking Devices
  • Hacking Windows Phone OS
  • Introduction
  • What is WebServer and its architecture?
  • Type of WebServer
  • Impact of WebServer Attacks
  • Compromised use details
  • Information Gathering for DNS related information
  • Tools used
  • Scanning
  • Tool
  • Nmap
  • Gaining Access
  • Attacks
  • Tools
  • SMTP Relay
  • Website Mirroring
  • Man-in-middle-attack
  • Http response splitting attack
  • Privilege Escalation
  • Metasploit
  • Countermeasure
  • Introduction
  • Types of firewall
  • Firewall implementation
  • Unified threat management
  • Evading Firewalls
  • Firewall Identification
  • IP Address Spoofing
  • Source Routing
  • Tiny Fragments
  • Bypass Blocked Sites Using IP Address in Place of URL
  • Bypass Blocked Sites Using Anonymous Website Surfing Sites
  • Bypass a Firewall Using Proxy Server
  • Bypassing Firewall through ICMP Tunnelling Method
  • Bypassing Firewall through ACK Tunnelling Method
  • Bypassing Firewall through HTTP Tunnelling Method
  • Bypassing Firewall through SSH Tunnelling Method
  • Bypassing Firewall through External Systems
  • Bypassing Firewall through MITM Attack
  • Bypassing Firewall through Content
  • Intrusion Detection System
  • Intrusion Prevention System
  • Honeypots
  • Introduction
  • Statistics of Malware Infection
  • Type of malwares
  • Malware Economy
  • Impact of Malware Infections
  • Countermeasures
  • Conclusion
  • Introduction to DoS
  • DDoS attacks
  • Statistics related to DoS
  • Types of DDoS attacks
  • Sources & tools of DDoS
  • Detection of DoS Attacks
  • Mitigation Strategies
  • Unintentional DoS
  • Economics of DoS
  • Impact of DoS
  • Introduction to Wireless Networks
  • Introduction to 802.11WLAN Protocols
  • Basic concepts
  • Wireless attack scenarios
  • Bypassing WLAN Authentication
  • Cracking WEP Wi-Fi networks
  • Cracking WPA/WPA2 Wi-Fi networks
  • Client Side Wi-Fi Attacks
  • Man in the Middle Attack
  • Wireless Penetration testing
  • Conclusion
  • Factors that make companies
  • Warning signs of attack
  • Phases in a social engineering attack
  • Common targets of social engineering
  • Human Based Social engineering
  • Computer based social engineering
  • Mobile based social engineering
  • Insider Attack
  • Preventing Insider threats
  • Masquerading on Social Networking
  • Identity Theft
  • Social engineering Countermeasures
  • How to detect phishing emails
  • Identity Theft Countermeasures
  • Introduction
  • Deployment model
  • Categories of Cloud Computing
  • Cloud Computing Benefits
  • Information Management and Data
  • Interoperability and Portability
  • Cloud Security Models
  • Cloud Security
  • Cloud Security Tools
  • Limitations of Cloud
  • Privacy and Security Concerns
  • Conclusion
  • Introduction to IoT
  • Technical Overview of IoT
  • Security of IoT Devices
  • Use of IoT
  • Challenges in IoT
  • Conclusion
  • Introduction
  • Penetration testing
  • Vulnerability Assessment vs Penetration testing
  • Legal Authority
  • Importance of Penetration testing
  • Advantages of Pentesting
  • Method of pentesting
  • Penetration Testing Execution Standard
  • Stages of pentesting
  • Reporting
Still have doubts? Talk to our counsellor
Contact Us
Accredited By

Alumnus of Kratikal working at