ADIE

Advanced Diploma in Information Security & Ethical Hacking (ADIE)

Introduction:

cehEthical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions:

1. What information/locations/systems can an attacker gain access?

2. What can an attacker see on the target?

3. What can an attacker do with available information?

4. Does anyone at the target system notice the attempts?

An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts.

The course gives broad knowledge about information security and Ethical hacking. The course is specially designed and is a complete course as it starts from the basics and later covers all related concepts. This course enables the candidate to work on latest platforms like Windows 8, Windows Server 2012, Linux, etc.

Industry Overview:

Ethical hacking was estimated to be a US$ 3.8 billion industry last year but its grown more. Salaries range from £30,000 to £ 60,000 per annum or £300 and above per day. The information Security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 4.2 million information security professionals worldwide which is expected to increase to nearly 6.2 million by 2020.

Course Pattern

 

 

Semester – 1

Module

Duration (Instructional Hours)

Logic Building and Elementary Programming

40

Basics of HTML5 and Java Scripting

20

Network technologies Part – 1

32

Operational Security

40

Total

132

Learning Objectives – Semester 1

  • Explain basic structure and tags of HTML5
  • Explain JavaScript basics
  • Describe steps for installation, configuration media and topologies
  • Explain network management and security
  • Explain administrative controls
  • Describe physical controls, logical controls, perimeter security controls and access control
  • Explain how to identify & authenticate
  • Explain Information Security Awareness
  • Explain Audit and Compliance, Logs and Monitoring, Backup types
  • Describer different types of backup

 

Semester – 2

Module

Duration (Instructional Hours)

Network Technologies Part – II

32

Information Security and Organizational
Structure

40

Introduction to Ethical Hacking

20

Social Engineering and User Awareness

20

Risk Management

20

Project

24

Total

156

 

Learning Objectives – Semester 2

  • Configure, verify, troubleshoot basic router operation and routing on Cisco/Juniper devices
  • Identify security threats to a network and describe general methods to mitigate those threats
  • Explain concepts like Intranet security, describe Managements like Change, Incident & Patch
  • Describe General cyber laws/standards, Identifies Information security policies & Procedures
  • Identify organizational level, system level, administrative level and Issue Specific Policies
  • Explain Penetration Testing & Information Gathering
  • Describe Foot printing, Detecting Live Systems, Reconnaissance, Enumeration and Vulnerability assessment
  • Explain definition of Social Engineering & goals of Social Engineering
  • Describe types of Social Engineering and Classification of Information security assets
  • Identify threat, Risk Vulnerabilities & Information security controls
  • Explain purpose of risk management, Business Impact analysis & Quantitative Analysis

 

Semester – 3

Module

Duration (Instructional Hours)

Configuring a Network Infrastructure

30

Linux System Administration

40

Mobile Computing and Cloud Computing

30

Windows Server Administration and
Services

40

 Total

140

 

Learning Objectives – Semester 3

  • Explain Installation and Configuration of Windows Server
  • Describe configuration of Server Roles and Features
  • Explain Deployment and Configuration of core network services
  • Explain Installation and Administering Active Directory and creating and Managing Group policies
  • Describe how to install, configure and administer the newest version of Red Hat Linux Server
  • Describe Linux security and shell scripting
  • Describe different types of Mobile OS & devices
  • Explain different mobile protocols and networking
  • Explain basics of cloud computing & server administration
  • Describe how to assign CA, DNS, and DHCP

 

Semester – 4

Module

Duration (Instructional Hours)

WAN Security and Wireless Technology

40

Database Management (Database Security
and Development)

30

Cryptography

12

Security Models and Evaluation
Criteria

40

Project

24

Total

146

 

Learning Objectives – Semester 4

  • Explain different WAN technologies and securities
  • Explain different wireless technologies and securities
  • Explain different types of database models
  • List and describe ways to prevent attacks
  • Explain cryptography
  • List different types of encryption algorithms
  • List advantages and disadvantages of different types of encryption algorithms
  • Explain different types of security models
  • List and describe security kernel requirements

 

Semester – 5

 

Module

Duration (Instructional Hours)

Programming with Python and HTML5
Security

40

Software Development Security

24

Security Architecture & Hacking

40

Handheld Devices Security

16

Cloud Security

20

Total

140

 

Learning Objectives – Semester 5

  • Explain various concepts in Python like flow control , list , functions, etc
  • Explain types, variables and Input/output
  • Describe security in Embedded Systems
  • Explain Development Methodologies, Maturity Models, & Security Issues
  • Describe ActiveX Security, Java, and Applets
  • Explain Common Gateway Interface working of CGI Scripts &Describe Modularity of Objects
  • Explain Object-Oriented Programming Characteristic & Architecture Components
  • Explain Key Architecture Concepts –Plan & Describe Objectives of Security Architecture
  • Explain technology domain modeling, Integrated Security is Designed Security & Memory Management
  • Describe Accessing Memory Securely & lists types of Compromises
  • Explain the various attack types & Secure Mobile networks
  • Describe different hand held devices, their vulnerabilities & different types of cloud security

 

Semester – 6

 

Module

Duration (Instructional Hours)

Advanced Ethical Hacking

48

BCP/DR(Business Continuity &
Disaster Management)

40

Windows/Unix/Linux Hacking &
Computer Forensics

60

Project

24

Total

172

Learning Objectives – Semester 6

  • Explain BCP Development
  • Explain Critical products and services
  • Identify Vulnerabilities and Threats
  • Identify Function Resources
  • Describe Operation Time Without Resources
  • Calculate MTD, RTO, & Recovery Point Objective
  • Calculate maximum data loss
  • Explain different hacking methods in Windows OS
  • Explain different hacking methods in Linux/UNIX
  • Explain Computer Forensics

 

Certification

Semester

Certificate name

Semester 1

Certificate in Network
Technologies (CNT)

Semester 2

Diploma in Information
Security (DIS)

Semester 3

No Exit

Semester 4

Higher Diploma in
Information Security (HDIS)

Semester 5

No Exit

Semester 6

Advanced Diploma in
Information Security & Ethical Hacking (ADIE)

 

 

The Route to an International Degree

british-flag-img

The ADIE course entitles you to transfer your credits and gain entry into the Final Year of B.Sc. (Hons.) Degree as per details given below.

 

Study ADIE at Aptech

Advanced Diploma in Information Security & Ethical Hacking (ADIE)

final-year

B.Sc. (Hons) from Middlesex University

Study in London, Dubai Mauritius and Malta

……………………………………………………………….

B.Sc. (Hons) Information Technology

B.Sc. (Hons) Information Technology & Business Information Systems

B.Sc. (Hons) Computer Networks

B.Sc. (Hons) Computer Science (Systems Engineering)

……………………………………………………………

Preferred University Partner

middle-sex1-gif

DISCLAIMER: In our effort to serve our customers better, the courses are upgraded to add new technologies and the course outline may change accordingly. The credit transfer arrangement or the University alliance may change over time. The customer is requested to check the exact course outline and credit transfer arrangement at the centers before enrolling for a particular course. All trademarks acknowledged.

 

 

Find a suitable course
Choose a Course
Choose a Technology