iQAEH - ISEH Qualified Amateur Ethical Hacker
Who is Ethical Hacker?
A hacker is a computer expert who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. The term hacker has become associated in popular culture with a security hacker, someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be unavailable to them.
Hackers are categorized based on their working methodology, care of law, and ethics. Amongst them, an ethical hacker is defined as a technological specialist who is generally hired by an organization to examine its security systems in order to identify flaws that can be exploited by others. Ethical hackers may utilize the same tactics as other types of hackers, but instead of exploiting the vulnerability for their own gains, they report the vulnerabilities to the owner.
To become an ethical hacker worth their salt, one must have a base knowledge of certain technologies, tools, and systems. This Amateur Ethical Hacking course delves into the basics of computer systems, operating systems, networking, web applications, databases, and a host of other miscellaneous technologies. It also covers the methodology of hacking, actual exploitation exercises, and cyber laws. This course will enable beginners to take their first confident leap into the information and cyber security spectrum with ease.
Course Details:
Course Title: iQAEH - ISEH Qualified Amateur Ethical Hacker
Batch No.: 05
Duration: 8 Weeks
Class Timings: Between 6:15pm to 9:30pm on Tuesday, Thursday and Saturday
Registration: Open Now
Venue: ISEH Main Campus (9 Noon Avenue, Block C, Muslim Town, Lahore)
Mode of Education/Training: On Campus physical classes.
Registration Fee (Non Refundable): Rs. 500/- (Pak Rupees Five Hundred Only)
Course Fee: Rs. 30,000.00 (Pak Rupees Thirty Thousand Only). Deserving candidates can pay in instalments.
Discounts: Discount is available to group attendees and certain categories.
Note: Registration forms can be either physically submitted at main campus of ISEH or sent through courier service.
Who Can Join:
Anyone who has passed at least his 10th standard, is a general computer users who want to learn more about information and cyber security.
IT professionals who want to switch to a career in information and cyber security.
Anyone with prior experience in information and cyber security who wants to get certified.
What You Will Learn:
After completing this course, you will have a basic understanding of the following topics:
Computer Science: This includes knowledge of computer systems, data, digital logic, computer architecture, computer programming, operating systems, essential software, artificial intelligence, virtualization, emerging and future trends in computers and computing, telecommunication, signal generation, data transmission, communication networks, embedded systems (IoTs), and security of communication networks.
Cybercrimes and Cyber Laws: This broadly covers Pakistani cyber laws, as well as the concepts of cybercrime, cyberwarfare, and cyberterrorism.
Introduction to Information Security: This section encompasses the need for information security, the challenges of information security, essential terms, security models, information threats, and common types of attacks.
The Art of Ethical Hacking: This includes the basics of ethical hacking, the skills needed to become an ethical hacker, the code of conduct for ethical hackers, and the basic frameworks & tools used in ethical hacking.
Ethical Hacking Methodology: Here you will learn the approaches, phases, and exercises used in ethical hacking, as well as cryptography & steganography.
Measures to Protect Digital Systems: This includes both defensive and offensive measures that can be used to protect digital systems from hacking attempts.
Bug Bounty Programs: This section gives an introduction to bug bounty programs, which are programs that offer rewards to people who find security vulnerabilities in software.
The Future of Ethical Hacking: Here you will get an overview of the future of ethical hacking and how to proceed further in the field of information security.
Basic Communication and Presentation Skills: This includes the ability to communicate effectively about information security topics and to give presentations on these topics.
Course Syllabus:
Module 1 - Fundamentals of Computing and Computers
Introduction to Computers
History of Computers & Computing
Computer System Components & Organization
User Interfaces
Booting Process
DOS, Shells & Commands
Computer System Abstraction
Data Representation, storage & Retrieval
Data Processing
Data Storage, Systems & Solutions
Numbering Systems & Conversions
Computer Organization & Design
Computer Architecture
Digital logic & Circuit Design
Electronic Circuit Design Process
Operating System
Fundamentals of Programming
Labs
Module 2 - Introduction to Telecommunication
Introduction to Telecommunication & Networking
Communication Systems
Networks & Networking
Internet & Web
Web Levels/ Layers
Protocols & Network Inter-Communication Architecture Models
Introduction Emerging Technologies/Trends in ICT
Labs
Module 3 - Cybercrimes and Cyber Laws
Cybercrimes
Internet usage worldwide and in Pakistan
Definition of cybercrime, cybercrime vs conventional crime
Reasons of cybercrimes & victims of cybercrime
Classification of cybercrimes
Cyber-Laws in Pakistan
Module 4 - Introduction to Information Security
Understanding Information Security
What is Cybersecurity
Cybersecurity vs Information Security
History and Evolution of Hacking
Types of Hackers and Famous Hackers
Module 5 - The Art of Ethical Hacking
PenTesting Types
PenTesting vs Ethical Hacking
Basics of Ethical Hacking
Skills Needed to Become a Good Ethical Hacker
Ethical hacker’s Code of Conduct
Basic Frameworks/Tools Needed for Ethical Hacking
Module 6 - Ethical Hacking Methodology
Approach, Methodology, Framework and Type
Approaches of Ethical Hacking
Phases of Ethical Hacking
Ethical Hacking Labs/Exercises
Module 7 - Cryptography and Steganography
Cryptography
Steganography
Module 8 - Measures against Cyber Attacks
Individual Level
Home Wireless Network
Organizational Level
Module 9 - Introduction to Bug Bounty Programs
Introduction to Bug Bounty Programmes
Evolution of Bug Bounty Programmes
Different Aspects of Bug Bounty Programmes
Major Bug Bounty Programmes
Difficulties and reservations of Bug Bounty Hunters
What Bug Bounty Hunters should do to Overcome Difficulties
Module 10 - Future of Ethical Hacking and Way Forward
The Complex and Multifaceted Future Threats to Information Security
Real Life Applications of Information Security and Ethical Hacking
Future Opportunities for Ethical Hackers
Module 11 - Basics of communication and presentation skills
Introduction
Importance of effective communication and presentation skills
Communication Skills
Presentation Skills
Common Communication and Presentation Challenges
Practicing and Improving Communication and Presentation Skills