Cyber Shield: Ethical Hacking 101

Overview

Welcome to AION Cyber Campus – Where Your Cyber Security Skills Begin

Are you curious about hacking? Do you want to turn that curiosity into high-demand skills? At AION Cyber Campus, our Cyber Shield: Ethical Hacking 101 program will equip you with the knowledge and hands-on experience to identify vulnerabilities, protect systems, and defend against cyber threats.

This program is designed for students who have completed O/Ls or A/Ls, helping you discover your passion for cyber security while building a strong foundation for a future career in this exciting field.

With expert trainers, hands-on labs, online learning options, and clear career pathways, Cyber Shield offers everything you need to start your journey in ethical hacking and cyber security. Join Cyber Shield at AION Campus and turn your curiosity into a rewarding career.

Why should you select Aion as your place to study?

Intake

November/March/July

Duration

6 months

Delivery

Online

What will you get

Cyber Shield: Ethical Hacking 101
Cyber Shield: Ethical Hacking 101

Learning Outcomes – Cyber Shield: Ethical Hacking 101

Content

Content topics and subtopics are carefully designed to give you a good exposure into Cyber Security.

Professional Certifications Guidance

image
image
image
image
image
image
image
image
image
image
image
image
image
image

Industry Partnerships

Module Name Content
Introduction to Cyber Security
Principals of Cyber Security
Security Controls
Network Security
Cryptography
Information Risk Management
Cyber Security Threats (SOC & Incident Handling)
Introduction to Digital Forensic
Introduction to Penetration Testing
Module Name Content
Security Operations
Incident response and management
Incident Handling Training: Ability to identify, assess, and respond to security incidents promptly and effectively.
Security policies, procedures, and best practices
Security auditing and compliance
Hands-on Security Operations Center (SOC) Training
Cyber Security Threats (SOC & Incident Handling)
Hands-on SIEM Training: This experience allows you to become proficient in configuring, monitoring, and customizing the SIEM solution, as well as comprehending its reporting and alerting capabilities
Module Name Content
Information Security Management and Architecture
Security Architecture and Design
Security and Risk Management
Designing, Developing, and Maintaining an Enterprise Information Security Program
Legal, Regulations, Investigations and Compliance
Business Continuity and Disaster Recovery Management/Planning
Strategic Planning, Finance, Procurement and Vendor Management
Module Name Content
Vulnerability Assessment
Identifying and assessing vulnerabilities
Hands-on-experience on vulnerability scanning and analysis tools
Hands-on experience on industry-leading vulnerability tools like Nessus, and Qualys and vulnerability tools like Nessus, Qualys, and OWASP ZAP.
Mitigation strategies and solutions
Module Name Content
Penetration Testing
Overview of penetration testing
Preparation and conducting penetration tests
Reporting and remediation process
Module Name Content
Application Security
Identifying the need for security in software
Secure software development practices
Implementing common protections
Cryptography
Maintaining security in deployed software
Module Name Content
Business English
Effective communication in a professional setting
Business writing and documentation
Interpersonal skills in a workplace
Personal Branding
Professional grooming
Business Etiquettes
Presentation and negotiation skills