0% found this document useful (0 votes)
72 views

Appin Iseh

The document outlines the course coverage of an information security and ethical hacking course. It includes modules on desktop and server security, web security, network security, hacking attacks, data security, cyber forensics, information security management systems, and cyber laws. Each module contains multiple units covering topics such as vulnerability assessment, penetration testing, malware, cryptography, and security auditing.

Uploaded by

Kalathil Karthik
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
72 views

Appin Iseh

The document outlines the course coverage of an information security and ethical hacking course. It includes modules on desktop and server security, web security, network security, hacking attacks, data security, cyber forensics, information security management systems, and cyber laws. Each module contains multiple units covering topics such as vulnerability assessment, penetration testing, malware, cryptography, and security auditing.

Uploaded by

Kalathil Karthik
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

File: /home/karthik/Desktop/appin iseh

Course Coverage: MODULE: INTRODUCTION TO INFORMATION SECURITY AND ETHICAL HACKING MODULE: DESKTOP AND SERVER SECURITY UNIT 1: DESKTOP & SERVER SECURITY UNIT 2: LINUX SECURITY MODULE: UNIT 1: UNIT 2: UNIT 3: UNIT 4: WEB SECURITY LAN SECURITY FIREWALL SECURITY INTERNET SECURITY E-MAIL SECURITY

Page 1 of 1

MODULE: VAPT UNIT 1 : INTRODUCTION UNIT 2 : VULNERABILITY ASSESSMENT UNIT 3: PENETRATION TESTING MODULE: NETWORK SECURITY UNIT 1: MOBILE SECURITY UNIT 2 : VOICE OVER INTERNET PROTOCOL UNIT 3 : VIRTUAL PRIVATE NETWORK SECURITY UNIT 4 : WIRELESS LAN UNIT 5 : ROUTER SECURITY UNIT 6: INTRUSION DETECTION AND PREVENTION UNIT 7: ACCESS CONTROL MODULE: HACKING ATTACKS UNIT 1 : MALWARES UNIT 2 : HACKING ATTACKS UNIT 3 : ART OF GOOGLING MODULE: DATA SECURITY UNIT 1 : INTRODUCTION UNIT 2 : DATA BACKUP UNIT 3 : CRYPTOGRAPHY UNIT 4 : STAGENOGRAPHY MODULE: UNIT 1: UNIT 2: UNIT 3: CYBER FORENSICS CYBER CRIME CYBER FORENSICS CATCHING CRIMINALS

MODULE: ISMS UNIT 1 : SECURITY AUDITING UNIT 2: LEAD AUDITOR: IT (LA-27001) MODULE: CYBER LAWS AND IT ACTS

You might also like