Course Description

Network Automation and Bug Bounty Certifications. There is no prerequisite for taking up the CCNA Training; however a fundamental Knowledge of IP, basic configuration of switches and routers would be added Advantage. CEH is obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools. A bug bounty program is a deal compensation for reporting bugs. A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs Network automation is a methodology in which software automatically configures provisions, manages and tests network devices.

Curriculum

Overview of ethical hacking and hacking

Used for collecting information from target network and system

Used for identifying target hosts, ports and services running in a network.

The process of extracting user names, machine names, network resources, shares and services from a system.

t refers to auditing hosts, ports and services in a network. Search for security loopholes. System Hacking

Used by network/system administrator to monitor and troubleshoot network traffic.

It is a nontechnical method of breaking into a system or network

It refers to the exploitation of a valid computer session. An attacker takes over session between two computers

An IDS is a device or software application that monitors networks and/or system for malicious activities

It can be referred to as the hardware the software and the computer. The computer application that delivers content that can be accessed through internet.

Web application provides an interface between end users and web servers.

Used to attack a website and the most common website vulnerability on the internet.

Used in the wireless communication

Used to allow communication between users on radio frequencies

The need for automated devices which controls our daily tasks on fingertips is increasing day by day

Internet based computing and handle large group of remote servers. Centralized data storage and online access to computer services or resources.

Used for hiding meaningful information in an unreadable format.

Introduction to Bug bounty and Penetration Testing Information Gathering Basics NMAP Penetration testing AD Pen Testing

Maped Certification

CEH (312-50)-4 hours,125 @,70%,Multiple choice

Exit Profile

desktop Support Engineer

Network Engineer

Network Support Engineer

Network Technician

Network Administrator

Infrastructure Engineer

IT Engineer

Security Analyst Network

Automation Engineer

Penetration Tester