Information Security and Ethical Hacking (ISEH)

In the growing cyberspace, today, security is one the most important functions. Large MNCs, Banks, I.T. companies etc. need professionals who would keep their data and information safe against the attack of black-hat hackers. To satisfy the need of this emerging and crucial industry, Aptech offers the Information Security and Ethical Hacking (ISEH) Program. The three-year program trains you in information security awareness, cryptography, encryption algorithms, and different types of security models. It gives you an opportunity to be hired by top companies to protect and secure their data.

In the world today, cybersecurity is of utmost importance. The world is a global village connected by computers and with these connections come the real threat of attack by malicious persons. Users of computer systems and networks which include individuals, firms,
companies, multinationals, agencies and governments have to protect themselves from cyberattacks by black-hat hackers who violate computer security for reasons not more than maliciousness and personal gain and aggrandisement.

This is where STPL Education comes in with the Aptech Information Security and Ethical Hacking (ISEH) programme. The three-year program trains you in information security awareness, cryptography, encryption algorithms, and different types of security models. Here, students will learn the same skills black-hat hackers possess – knowing how to find and exploit vulnerabilities and weaknesses in various systems – however, the skills will be used legitimately and lawfully by trying to find vulnerabilities in the system before the malicious hackers discover them and infiltrate the system.

An ethical hacker is the ultimate cybersecurity professional and undergoing the Information Security and Ethical Hacking (ISEH) programme and subsequently being certified as a cybersecurity professional gives you the opportunity to be hired by top companies to protect and secure their data.

The programme is divided into six semesters with each semester containing different modules. After each semester, students will be awarded certain certifications. For example, after the completion of the first semester, the Certificate in Network Technologies (CNT) will be
awarded while after the completion of the second semester, the Diploma in Information Security (DIS) will be awarded. The completion of the third and fourth semesters will see students awarded the Higher Diploma in Information Security (HDIS) while the completion of the fifth and sixth semesters will see students awarded the Advanced Diploma in Information Security & Ethical Hacking (ADIE).

In the first and second semesters, students will learn everything from logic building and elementary programming to information security and organisational structure. These will teach them the basic structure and tags of HTML5, JavaScript basics, steps for installation and configuration of media, configuration, verification & troubleshooting of basic router operations and routing on Cisco/Juniper
devices, identification of security threats to a network and general methods on how to mitigate those threats.

From the third to the last semester, the lectures will be as informative as ever with students being taught how to configure a network infrastructure, the administration of the Linux operating system, database management, cryptography, security architecture and hacking, security of handheld devices (smartphones), cloud security, advanced ethical hacking and computer forensics.

At the end of the course, students will understand and be able to explain and demonstrate different techniques and ways of
troubleshooting, protecting and ethically hacking into systems.

Each semester has an average of 140 hours of lectures that are taught by world-class professionals in the most conducive of facilities. STPL Education offers a pathway to being a professional ethical or white-hat hacker with this innovative programme.

CERTIFICATION

Semester 1Certificate in Network Technologies (CNT)
Semester 1+2Diploma in Information Security (DIS)
Semester 1+2+3+4Higher Diploma in Information Security (HDIS)
Semester 1+2+3+4+5+6Advanced Diploma in Information Security & Ethical Hacking (ADIE)

MODULES

SEMESTER 1

Semester 1MODULEDURATION
(INSTRUCTIONAL HOURS)
Logic Building and Elementary Programming40
Basics of HTML5 and Java Scripting20
Network Technologies Part I32
Operation Security40
Total132
Job Profile: Network Technician

LEARNING OUTCOMES (SEM-1):

Learning - Semester 1
• Explain basic structure and tags of HTML5
• Explain JavaScript basics
• Describe steps for installation, configuration media, and topologies
• Explain network management and security
• Explain Administrative controls
• Describe physical controls, logical controls, perimeter security controls and access controls
• Explain how to identify & Authenticate
• Explain Information Security Awareness
• Explain Audit and Compliance, Logs and Monitoring, & Backup types
• Describe different Backup Types
• Describe how to install, configure and administer the newest version of Red Hat Linux Server
• Describe Linux security and shell scripting
• Describe different types of Mobile OS & devices
• Explain different mobile protocols and networking
• Explain basics of cloud computing & server administration
• Describe how to assign CA, DNS, and DHCP
• Describe different hand held devices, their vulnerabilities & different types of cloud security

SEMESTER-2

Semester 2MODULEDURATION
(INSTRUCTIONAL HOURS)
Network Technologies Part II32
Information Security & Organizational Structure40
Introduction to Ethical Hacking20
Social Engineering and User Awareness20
Risk Management20
Project24
Total156
Job Profiles: Security Administrator

LEARNING OUTCOMES (SEM-2):

Learning Semester 2
• Configure, verify, troubleshoot basic router operation and routing on Cisco/Juniper devices
• Identify security threats to a network and describe general methods to mitigate those threats
• Explain concepts like Intranet security, describe Managements like Change, Incident & Patch
• Describe General cyber laws/standards, Identifies Information security policies & Procedures
• Identify organizational level, system level, administrative level and Issue Specific Policies
• Explain Penetration Testing & Information Gathering
• Describe Foot printing, Detecting Live Systems, Reconnaissance, Enumeration and Vulnerability assessment
• Explain definition of Social Engineering & goals of Social Engineering
• Describe types of Social Engineering and Classification of Information security assets
• Identify threat, Risk Vulnerabilities & Information security controls
• Explain purpose of risk management, Business Impact analysis & Quantitative Analysis

SEMESTER-3

Semester 3MODULEDURATION
(INSTRUCTIONAL HOURS)
Configuring a Network Infrastructure30
Linux System Administration40
Mobile Computing & Cloud Computing30
Windows Server Administration and Services40
Total140

LEARNING OUTCOMES (SEM-3):

Learning Semester 3
• Describe different Backup Types
• Explain Installation and Configuration of Windows Server
• Describe configuration of Server Roles and Features
• Explain Deployment and Configuration of core network services
• Explain Installation and Administering Active Directory and creating and Managing Group policies
• Describe how to install, configure and administer the newest version of Red Hat Linux Server
• Describe Linux security and shell scripting
• Describe different types of Mobile OS & devices
• Explain different mobile protocols and networking
• Explain basics of cloud computing & server administration
• Describe how to assign CA, DNS, and DHCP

SEMESTER - 4

Semester 4MODULEDURATION
(INSTRUCTIONAL HOURS)
WAN Security & Wireless Technology40
Database Management (Database Security and Development)30
Cryptography12
Security Models and Evaluation Criteria40
Project24
Total146
Job Profiles: Security Specialist

LEARNING OUTCOMES (SEM-4):

Learning Semester 4
• Explain different WAN technologies and securities
• Explain different wireless technologies and securities
• Explain different types of database models
• List and describe ways to prevent attacks
• Explain cryptography
• List different types of encryption algorithms
• List advantages and disadvantages of different types of encryption algorithms
• Explain different types of security models
• List and describe security kernel requirements
• Describe Accessing Memory Securely & lists types of Compromises

SEMESTER - 5

Semester 5MODULEDURATION
(INSTRUCTIONAL HOURS)
Programing with Python & HTML5 Security40
Software Development Security24
Security Architecture & Hacking40
Handheld devices Security16
Cloud Security20
Total140

LEARNING OUTCOMES (SEM-5):

Learning Semester 5
• Explain various concepts in Python like flow control, list, functions, etc.
• Explain types, variables and Input/output
• Describe security in Embedded Systems
• Explain Development Methodologies, Maturity Models, & Security Issues
• Describe ActiveX Security, Java, and Applets
• Explain Common Gateway Interface working of CGI Scripts & Describe Modularity of Objects
• Explain Object-Oriented Programming Characteristic & Architecture Components
• Explain Key Architecture Concepts – Plan & Describe Objectives of Security Architecture
• Explain technology domain modelling, Integrated Security is Designed Security & Memory Management
• Describe Accessing Memory Securely & lists types of Compromises
• Explain the various attack types & Secure Mobile networks
• Describe different hand held devices, their vulnerabilities & different types of cloud security

SEMESTER - 6

Semester 6MODULEDURATION
(INSTRUCTIONAL HOURS)
Advanced Ethical Hacking48
BCP/DR (Business Continuity & Disaster Management)40
Windows/Unix/Linux Hacking & Computer Forensics60
Project24
Total172
Job Profiles: Security Analyst, Ethical Hacker

LEARNING OUTCOMES (SEM-6):

Learning Semester 6
• Explain BCP Development
• Explain Critical products and services
• Identify Vulnerabilities and Threats
• Identify Function Resources
• Describe Operation Time Without Resources
• Calculate MTD, RTO, & Recovery Point Objective
• Calculate maximum data loss
• Explain different hacking methods in Windows OS
• Explain different hacking methods in Linux/UNIX
• Explain Computer Forensics