Domain Computer

Employer Enquiry
Please enable JavaScript in your browser to complete this form.
Enquire Now
Please enable JavaScript in your browser to complete this form.
Candidate Name

Kolhapur | Sangli

hr@domaincomputer.org

9225804090 | 7620575756

Module III

Post:- Information Security Analyst, IT Security Engineer, Penetration Tester, Information Security Consultant ,Cyber Security Analyst
Module Duration:- 3 Months
Daily:- 2.00 to 2.30 Hours
Eligibility:- Graduate/BCA/BE/MCA
Global IT Certification:- CEH/CyberOps Associate
Target Audience:- Ethical hackers, System Administrators, Network Administrators and Engineers

The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! As we put it, “To beat a hacker, you need to think like a hacker”.

Exam Number :- 312-50

Certified Ethical Hacker
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance, Scanning Networks
  • Enumeration, Vulnerability Analysis, System Hacking
  • Malware Threats, Sniffing, Social Engineering
  • Denial-of-Service, Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers, Hacking Web Applications
  • SQL Injection, Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IOT Hacking, Cloud Computing, Cryptography

The new Cisco Certified CyberOps Associate program focuses on the latest operational skills and knowledge you need for real-world jobs in security operations centers (SOCs). SOC analysts serve as the front line of defense against cybersecurity threats – preventing and detecting threats to defend your organization. Certification as a cybersecurity operations associate validates your skills in this vital function.

Exam Number :- 200-201

Understanding Cisco Cybersecurity Operations Fundamentals v1.0 (200-201)
  • Security Concepts – 20%
  • Security Monitorin – 25%
  • Host based Analysis – 20%
  • Network Intrusion Analysis – 20%
  • Security Policies and Procedures – 15%