fbpx

Diploma Courses

Diploma in Information Security & Ethical Hacking

26
Overview
Prerequisites
Topics
Objectives
Certification
Overview

The ever-increasing innovation of technology is bringing a greater demand for professionals with sophisticated skills in cyber security. Ignoring risk when it comes to Cyber Security can be disastrous. With the increasing number of smart gadgets connected to the cyber world, the Internet of Things (IoT) is becoming ever larger. Recent hacks and scams have shown that it is not only large organizations and corporations that are being targeted but also the personal data of everyday people.

 

Every role within IT has a cyber-security aspect. Focusing on security as a primary role opens up a world of options. From security operations, to risk assessments, to application security to investigations, to compliance to educator, there as many roles within cyber security as lines of code running in a browser.

 

This Diploma program is made for students as well as professionals who either want to build or advance a profession in the Cyber security space. Upon completion of the program, students get all round endorsed certificate by IADL (International Association for Distance Learning) and USDLA (United State Distance Learning Association), hence opens up to many job opportunities.

Prerequisites
  • This course requires someone with who has basic skills in PROGRAMMING & NETWORKING.
  • If you don’t have knowledge of the above skills, we will offer a course on Programming and Networking just to bring you up to speed with skills required to handle this Diploma course.
  • NETWORKING & PROGRAMMING course takes 1 month and costs KES 20, 000. Thereafter you will be eligible to take the Diploma course.
Topics
  • Introduction To Information Security
  • Desktop And Server Security
  • Data Security
  • Network Security
  • Web Security
  • Vapt
  • Protection From Hacking Attacks
  • Information Security Management System
  • Cyber Laws And It Acts
  • Cyber Forensics
  • Communication Security
Objectives

What you will learn:

  • Knowledge of Ethical Hacking Terminologies
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
Certification

Certification

  • Upon successful completion of the program, the student will get a certificate of training from IST.
  • Once the student successfully completes the exam, they also get a Certificate from Appin Technology Lab.

Programme

At Institute of Software Technologies, we have flexible training schedule that suit your availability.

You can choose from the following available options:

Apply Now For Our Next Intake

Diploma in Information Security & Ethical Hacking

Relative Courses

Programing

SQL Fundamentals

SUSE Linux

Server Administration

VMware Courses

VMware – Foundation Course

Security Courses

Certified Chief Information Security Officer (CCISO)

Security Courses

EC-council Certified Security Analyst (ECSA)

VMware Courses

VMware Data Center Virtualization Course

Programing

PL/SQL

Adobe Certification

Dreamweaver

Adobe Certification

Flash Professional

Adobe Certification

Adobe Photoshop

Programing

ZEND PHP

Oracle Database 12c R2: Program with PL/SQL Ed 2

0 student

Oracle Database 12c: Backup & Recovery Workshop

0 student
Programing

PHP

Security Courses

Computer Hacking Forensic Investigator Certification

Oracle Courses

Oracle Database 11g: Administration Workshop I

UNIX and Linux Essentials

0 student

E-Business Suite Financial Management Training and Certification

0 student

Oracle Cash Management Fundamentals

0 student

Oracle E-Business Tax Fundamentals

0 student
Security Courses

Licensed Penetration Tester (LPT)

Oracle General Ledger Management Fundamentals

0 student

Oracle Inventory Management Fundamentals

0 student
Adobe Certification

Adobe Illustrator

Oracle iProcurement Fundamentals

0 student
Oracle Courses

Oracle Database 11g: Administration Workshop II

Oracle Order Management Fundamentals

0 student
Adobe Certification

Adobe InDesign

Short Courses

Corel Draw

Oracle Courses

Oracle Database 11g: Performance Tuning

Security Courses

Certified Network Defender Certification (CND)

Short Courses

ICDL Certification

Management

ITIL 2011 Foundation

Programing

Core Java

Oracle Courses

Introduction to SQL

J2EE Architecture & JSP

Oracle Courses

Oracle Database 12c: Managing Multitenant Architecture

Programing

SQL / EJB&RM

Oracle Courses

Oracle Database 12c: Install and Upgrade Workshop

Oracle Courses

Data Modeling & Relational Database Design

Oracle Courses

Oracle 10g Forms Developer: Build Internet Apps

Oracle Courses

Oracle Reports Developer 10g: Build Reports

Microsoft

Administering Windows Server 2012

Android Application Development

Diploma Courses

Diploma in Database Administration & Application Development

Microsoft

Installing and Configuring Server

Microsoft

Configuring Advanced Windows Server

Programing

Python

Management

PRINCE2

Oracle Courses

Oracle Solaris 10 OS Part 1

Microsoft

Designing and Implementing a Server Infrastructure

Red Hat

System Administration III With RHCSA & RHCE

Red Hat

System Administration II With RHCSA

Red Hat

RHCSA Rapid Track

Red Hat

System Administration I

Oracle Courses

Oracle Solaris 10 OS Part 1

Oracle Courses

Oracle Solaris 10 OS Part 2

Microsoft

Implementing an Advanced Server Infrastructure

Oracle Courses

Oracle Solaris 10 OS Essentials

SUSE Linux

Linux Enterprise

Short Courses

Appin Front Runner

Security Courses

Certified Ethical Hacker Certification (CEH)

SUSE Linux

SUSE Linux Enterprise 11 Administration