top of page
DEVOPS BANNER.jpeg
ACE logo_edited.png

Cyber Security & Ethical Hacking Specialization

 The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. It is a 2-course program which will help students learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM , vulnerability analysis, malware threats, sniffing, SQL injection, etc with hands-on demonstrations.

Online Learning

Learning Format

8-10 Weeks

Recommended 12-15 hrs/week

6

Transferrable College Credits*

March 13, 2023

Course Start Date

Call Us Now!

+1 (424) 454-0406

Program Overview

Key Highlights

5+ Case Studies & Real Life Projects

Personalized Mentorship and Query Resolution Sessions with Industry Experts

Earn Transferable College Credits  Fraction of the Cost

Gain Access to Virtual Cloud Labs

Online Instructor-led classes

Complimentary Access to Career Counselling Sessions

5+ Programming Tools & Languages

World Class Faculty Members & Industry Experts

  Request More Information   

Top Skills You will Learn

Ethical hacking, cryptography, computer networks & security, application security, idAM , vulnerability analysis, malware threats, sniffing, SQL injection

Advance your Career

Penetration Tester; Vulnerability Assessor; Information Security Analyst; Security Analyst; Certified Ethical Hacker (CEH) Ethical Hacker, Cyber Securiry Specialist

Earn College Credits

This course has been evaluated and recommended by ACE for 6 credit hour in the lower division baccalaureate degree category.

PrereqUisites

There are no prerequisites for enrollment in this Cyber Security Specialization. Basics are included in this course.

Course Fee

USD 3000

(USD 500 per credit)

EARLY BIRD OFFER!!

USD 900

(USD 150 per credit)

Only a few seats left!

Flat 70% Off. Discount Pre-applied.

Hurry Up! Offer valid for limited seats only.

Programming Languages & Tools Covered

Course Curriculum & Syllabus

Experience 100+ hours of best-in-class content by leading faculty and industry leaders in the form of videos, cases and projects, assignments, and live sessions. 

100+
Hours of Content

5+
Case Studies & Projects

5+
Programming Tools & Languages

Part 1 - Introduction to Security

Topics Covered: Need of Cybersecurity, CIA Triad, Security Architecture, Security Governance, Security Auditing, Regulations & Frameworks, Ethical Hacking, Types of Hackers, Phases of Ethical Hacking, Penetration Testing, Types of Penetration Testing, Footprinting, Objectives of Footprinting, Types of Footprinting, Footprinting Techniques, Types of cryptography, Hash functions, Digital signatures, Public Key Infrastructure (PKI), Attacks on cryptosystems

Learning Objectives:

  • Learn about the essential building blocks and basic concepts around cybersecurity such as Confidentiality, Integrity, Availability, Security Architecture, Security Policies, and so on. In addition to these concepts, students will also explore the core topics such as Security Governance, Audit, Compliance, and Security Architecture.  

  • Learn various forms of cryptographic techniques, their pragmatic relevance & weaknesses. Students will learn how cryptography, its components, methods, and its usage are employed in the enterprise to store and transmit messages safely.

 

Part 2- Attacks and Exploits

Topics Covered: Introduction to Computer Networks, Computer Networks - Architecture, Layered architecture, Open Systems Interconnect (OSI) Model, TCP/IP, Network Scanning, Enumeration, Common Network Threats/Attacks, Web server architecture, Web server attacks, Countermeasures and patch management, Web application architecture, Web application attacks, idAM, Vulnerability Analysis & System Hacking, Sniffing & SQL Injection, Attacks and Hijacking

Learning Objectives:

  • Learn about various aspects related to computer networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks.

  • Explore various known application weaknesses, techniques to attack them, and various controls/solutions to these vulnerabilities.

  • Overview of countermeasures that can be employed to protect from different cyber threats.

  • Learn about the aspects related to the principle of Identity & Access Management, various intricacies around concepts of authorization, authentication, identity & access management, and its benefits to an enterprise.

  • Learn how to analyze a system for various vulnerabilities. 

  • Learn the concept of malwares, its propagation techniques, its types, concept of sniffing, types of sniffing attacks, SQL injection & its types, and SQL injection methodologies.

Credits

Cyber Security & Ethical Hacking specialization is eligible for 6 college credits. 

View more info

Grading Policy

Your grade for this course will be calculated out of 1200 points. The minimum score required to pass and become eligible for college credit for this course is 840 points, or an overall course grade of 70%. 

View more info

Refund Policy

We offer users a three (3)- day, no-questions-asked money-back guarantee on all courses.

View more info