dots bg

CST+CEH Lite+ASA (English)

Course Instructor Skillpod Admin

₹60000.00

To enroll in this course, please contact the Admin
dots bg

Course Overview

Schedule of Classes

Course Curriculum

1 Subject

CST+CEH+ASA(ENG)

20 Exercises65 Learning Materials

CST+CEH Module 1 - Fundamentals of networks

Fundamentals of networks

Video
39:26

Fundamentals of networks

PDF

Fundamentals of networks - Assessment

Exercise

CST+CEH Module 2 - Introduction to Ethical hacking

Introduction to Ethical hacking (Part 1)

Video
52:42

Introduction to Ethical hacking (Part 2)

Video
22:26

Introduction to Ethical hacking

PDF

Introduction to Ethical hacking - Assessment

Exercise

CST+CEH Module 3 - Secure Network Protocols

Secure Network Protocols

Video
1:6:9

Secure Network Protocols

PDF

Secure Network Protocols - Assessment

Exercise

CST+CEH Module 4 - Linux for hackers

Linux for hackers

Video
54:40

Linux for hackers

PDF

Linux for hackers - Assessment

Exercise

CST+CEH Module 5 - Footprinting and Reconnaissance

Footprinting and Reconnaissance(Part 1)

Video
25:46

Footprinting and reconnaissance (Part 2)

Video
34:59

Footprinting and Reconnaissance

PDF

Footprinting and Reconnaissance - Assessment

Exercise

CST+CEH Module 6 - Scanning Network Enumeration

Scanning Network Enumeration-(Part 1)

Video
44:48

Scanning Network Enumeration (Part2)

Video
23:5

Scanning Network Enumeration

PDF

Scanning Network Enumeration - Assessment

Exercise

CST+CEH Module 7 - Vulnerability Analysis, Penetration Testing and Malware Threats

Vulnerability Analysis and Penetration Testing

Video
20:32

Vulnerability Assessment and Malware Threats

Video
20:32

Vulnerability Analysis and Penetration testing

PDF

Vulnerability Analysis, Penetration Testing and Malware Threats - Assessment

Exercise

CST+CEH 8 - System Hacking

System Hacking

Video
30:57

System Hacking

PDF

System Hacking - Assessment

Exercise

CST+CEH Module 9 - Hacking Mobile Platforms

Hacking Mobile Platforms

Video
23:29

Hacking Mobile Platforms

PDF

Hacking Mobile Platforms - Assessment

Exercise

CST+CEH Module 10 - Malware Threats

Malware Threats

Video
28:37

Malware Threats

PDF

Malware Threats - Assessment

Exercise

CST+CEH Module 11 - Sniffing

Sniffing (Part 1)

Video
20:44

Sniffing (Part 2)

Video
24:28

Sniffing

PDF

Sniffing - Assessment

Exercise

CST+CEH Module 12 - Wireless Security

Wireless Security (Part 1)

Video
53:36

Wireless Security (Part 2)

Video
8:30

Wireless Security (Part 3)

Video
12:31

Wireless Security

PDF

Wireless Security - Assessment

Exercise

CST+CEH Module 13 - Denial of Service(DoS)Attacks

Denial of Service(DoS)Attacks

Video
19:42

Denial of Service(DoS)Attacks

PDF

QB13

Exercise

CST+CEH Module 14 - Session Hijacking

Session Hijacking

Video
19:26

Session Hijacking

PDF

Session Hijacking - Assessment

Exercise

CST+CEH Module 15 - Evading IDS, Firewalls and Honeypots

Evading, IDS Firewalls and Honeypots (Part 1)

Video
27:32

Evading IDS, Firewalls and Honeypots (Part 2)

Video
12:19

Evading IDS, Firewalls, and Honeypots

PDF

QB15

Exercise

CST+CEH Module 16 - Hacking Web Server

Hacking Web Server

Video
9:26

Hacking Web Server

PDF

Hacking Web Server - Assessment

Exercise

CST+CEH Module 17 - Hacking Web Applications

Hacking Web Application (Part 1)

Video
11:14

Hacking Web Application (Part 2)

Video
13:10

Hacking Web Applications

PDF

Hacking Web Applications - Assessment

Exercise

CST+CEH Module 18 - Cryptography

Cryptography

Video
18:21

Cryptography

PDF

Cryptography - Assessment

Exercise

CST+CEH Module 19 - IOT Hacking

IOT Hacking

Video
4:00

IOT Hacking

PDF

IOT Hacking - Assessment

Exercise

CST+CEH Module 20 - Cloud Computing

Cloud Computing

Video
6:43

Cloud Computing

PDF

Cloud Computing - Assessment

Exercise

ASA Module 1 - Security Operations and Management

Security Operations and Management (Part 1)

Video
43:52

Understanding SOC Operations and SOP Workflow (Part 2)

Video
27:56

ASA Module 2 - Understanding Cyber Threats, IoCs and Attack Methodology

IoCs and Attack Methodology

Video
10:58

Understanding Cyberthreat

Video
26:52

ASA Module 3 - Incidents, Events & Loggings

Incidents, Events & Loggings

Video
9:54

ASA Module 4 - SPLUNK

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
16:47

SPLUNK, INSTALLATION TO SIEM ARCHITECTURE AND ITS COMPONENTS

Video
16:47

ASA Module 5 - Threat Intelligence

Fundamentals of Threat Intelligence

Video
9:32

How Threat Intelligence enhance cyber security

Video
13:6

Understanding Threat Intelligence

Video
32:30

ASA Module 6 - Incident Response

Incident response

Video
15:44

Incident response - 2

Video
9:35

Incident response -3

Video
9:35

Cyber Incident Recovery and Post-Incident Activities

Video
8:53

Incident Response - 4

Video
12:49

Incident Response -5

Video
12:16

Course Instructor

tutor image

Skillpod Admin

15 Courses   •   37 Students