|Introduction to Cryptography and Hashes||2 Hours|
|Router Penetration Testing||2 Hours|
|Reverse Engineering Part 1 - Windows Memory Management||2 Hours|
|Reverse Engineering Part 2 - Algorithm Reversing||2 Hours|
|Reverse Engineering Part 3 - File Manipulation||2 Hours|
|Malware Illustrations - Part 2||2 Hours|
|Network Security Auditing||2 Hours|
|Metasploit Framework - Part 1||2 Hours|
|Metasploit Framework - Part 2||2 Hours|
|Metasploit Framework - Part 3||2 Hours|
|Network Exploitation Frameworks||2 Hours|
|Introduction to Buffer Overflows - Part 1||2 Hours|
|Buffer Overflows - Part 2||2 Hours|
|Network Scanning VA Tools||2 Hours|
|CMS Exploitation and Database Pentesting||2 Hours|
|Wireless Sniffing||2 Hours|
|Network IDS IPS Implementation||2 Hours|
|System Hardening | Windows | Linux | Mac||2 Hours|
|Penetration Testing Report Generartion||2 Hours|
|Physical Security and Complaince||2 Hours|
The introductory ethical hacking course offered by ICDA Training has been specially developed with the motive of enhancing your basic knowledge about ethical hacking.
The duration of the ICEH Grade 2 course offered by ICDA Training is of one month. Every student undergoing this forty hour course can easily enhance their knowledge about system penetration, hacking and security.
ICDA introduces a virtual interactive platform to impart training in Cyber Security. On demand this course is being launched for students and professionals who wants to do this training from their own locations.
Cyber Security is a branch where digitally data and integrity of computing assets are protected. It is formulated to make networks, programs and data save from attacks, damages or unauthorized access.