dots bg

CST+CEH Lite+CSA (Malayalam)

Course Instructor Skillpod Admin

₹71500.00

To enroll in this course, please contact the Admin
dots bg

Course Overview

Schedule of Classes

Course Curriculum

1 Subject

CST+CEH+CSA (MAL)

19 Exercises68 Learning Materials

CST+CEH Module 1 - Fundamentals of networks

Fundamentals of networks

Video
32:24

Fundamentals of networks

PDF

Fundamentals of networks - Assessment

Exercise

CST+CEH Module 2 - Introduction to Ethical hacking

Introduction to Ethical Hacking

Video
1:6:12

Introduction to Ethical hacking

PDF

Introduction to Ethical hacking - Assessment

Exercise

CST+CEH Module 3 - Secure Network Protocols

Secure Network Protocols (Part 1)

Video
33:43

Secure Network Protocols (Part 2)

Video
47:1

Secure Network Protocols

PDF

Secure Network Protocols - Assessment

Exercise

CST+CEH Module 4 - Linux for hackers

Linux for hackers (Part 1)

Video
31:46

Linux for hackers (Part 2)

Video
25:2

Linux for hackers

PDF

Linux for hackers - Assessment

Exercise

CST+CEH Module 5 - Footprinting and Reconnaissance

Footprinting and Reconnaissance (Part 1)

Video
43:10

Footprinting and Reconnaissance (Part 2)

Video
31:21

Footprinting and Reconnaissance

PDF

Footprinting and Reconnaissance - Assessment

Exercise

CST+CEH Module 6 - Scanning Network Enumeration

Scanning Network Enumeration (Part 1)

Video
29:27

Scanning Network Enumeration (Part 2)

Video
15:12

Scanning Network Enumeration (Part 3)

Video
24:18

Scanning Network Enumeration

PDF

Scanning Network Enumeration - Assessment

Exercise

CST+CEH Module 7 - Vulnerability Analysis, Penetration Testing and Malware Threats

Vulnerability Analysis, Penetration Testing and Malware Threats

Video
23:38

Vulnerability Analysis, Penetration Testing and Malware Threats (Part 2)

Video
44:29

Vulnerability Analysis and Penetration testing

PDF

Vulnerability Analysis, Penetration Testing and Malware Threats - Assessment

Exercise

CST+CEH 8 - System Hacking

System Hacking (Part1)

Video
18:13

System Hacking (Part 2)

Video
17:23

System Hacking

PDF

System Hacking - Assessment

Exercise

CST+CEH Module 9 - Hacking Mobile Platforms

Hacking Mobile platforms

Video
27:00

Hacking Mobile Platforms

PDF

Hacking Mobile Platforms - Assessment

Exercise

CST+CEH Module 10 - Malware Threats

Malware Threats

Video
21:34

Malware Threats

PDF

Malware Threats - Assessment

Exercise

CST+CEH Module 11 - Sniffing

Sniffing (Part 1)

Video
54:31

Sniffing (Part 2)

Video
23:21

Sniffing

PDF

Sniffing - Assessment

Exercise

CST+CEH Module 12 - Wireless Security

Wireless Security (Part 1)

Video
1:7:40

Wireless Security (Part 2)

Video
9:45

Wireless Security (Part 3)

Video
9:35

Wireless Security (Part 4)

Video
8:32

Wireless Security

PDF

Wireless Security - Assessment

Exercise

CST+CEH Module 13 - Denial of Service(DoS)Attacks

Denial of service(DoS) attacks

Video
21:35

Denial of Service(DoS)Attacks

PDF

Denial of Service(DoS)Attacks - Assessment

Exercise

CST+CEH Module 14 - Session Hijacking

Session hijacking

Video
29:32

Session Hijacking

PDF

Session Hijacking - Assessment

Exercise

CST+CEH Module 15 - Evading IDS, Firewalls and Honeypots

Evading IDS, Firewalls and Honeypots

Video
35:19

Evading IDS, Firewalls, and Honeypots

PDF

Evading IDS, Firewalls and Honeypots - Assessment

Exercise

CST+CEH Module 16 - Hacking Web Server

Hacking Web Servers

Video
21:46

Hacking Web Server

PDF

Hacking Web Server - Assessment

Exercise

CST+CEH Module 17 - Hacking Web Applications

Hacking Web Application (Part 1)

Video
39:20

Hacking Web Application (Part 2)

Video
11:41

Hacking Web Application (Part 3)

Video
13:31

Hacking Web Application (Part 4)

Video
53:9

Hacking Web Applications

PDF

Hacking Web Applications - Assessment

Exercise

CST+CEH Module 18 - Cryptography

Cryptography

Video
22:34

Cryptography

PDF

Cryptography - Assessment

Exercise

CST+CEH Module 19 - IOT Hacking

IoT Hacking

Video
21:44

IOT Hacking

PDF

IOT Hacking - Assessment

Exercise

CST+CEH Module 20 - Cloud Computing

Cloud Computing

Video
16:25

Cloud Computing

PDF

CSA Module 1 - Security Operations and Management

Security Operations & Management

Video
43:52

CSA Module 2 - Understanding Cyber Threats, IoCs and Attack Methodology

Understanding Cyberthreat

Video
26:52

CSA Module 3 - Incidents, Events & Loggings

Understanding incidents,events and logs

Video
9:54

CSA Module 4 - SPLUNK

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
28:38

SIEM Capabilities and Different Type of SIEM Solution

Video
23:22

CSA Module 5 - Threat Intelligence

Module 5.1 Fundamentals of Threat Intelligence

Video
7:59

Module 5.2 Sources of Threat Intelligence

Video
9:48

Module 5.3 Sources of Threat Intelligence

Video
8:52

Module 5.4 Threat Intelligence Platforms

Video
19:31

Module 5.5 Integration of Threat intelligence to security operations

Video
23:36

CSA Module 6 - Incident Response

INCIDENT RESPONSE Part1

Video
40:29

INCIDENT RESPONSE Part 2

Video
38:41

INCIDENT RESPONSE Part 3

Video
18:46

INCIDENT RESPONSE Part 4

Video
30:2

Course Instructor

tutor image

Skillpod Admin

15 Courses   •   37 Students