If you have any suggestion, feedback or grievance, kindly send us anĀ email on feedback@mkcl.org
- Home
- KLiC Courses
-
- Designing
- KLiC DTP (Corel Draw)
- KLiC DTP (Adobe)
- KLiC Photoshop
- KLiC Web Designing
- KLiC Graphic Designing
- KLiC Content Illustrator
- KLiC Video Editing
- Programming
- KLiC C Programing
- KLiC C++ Programming
- Management
- KLiC Retail Management
- KLiC BFSI
-
- Hardware & Networking
- KLiC Hardware Support
- KLiC Network Support
- KLiC Security Support
- KLiC Desktop Support
- New Collar Jobs
- KLiC SCRATCH
- KLiC IoT
- KLiC Cyber Security
- KLiC Mobile App Development
- KLiC Diploma
- Admission
- Fee
- Downloads
- FAQs
- Learner Life Cycle
- Verify Your Result
- Course Demo
Course Details
Syllabus
- Overview of Computer Viruses
- Downloading and Installing Good Antivirus Software
- Rootkits
- Botnets
- Ransomware
- Securing Personal computers and Operating Systems
- Patch Management
- Patch Deployment and verification
- Installing and configuring Open Source Firewall
- Network Intrusion Detection and Prevention System
- Network Load Balancers
- Setting LAB environment
- VPN Configuration
- Types of Cyber Attacks
- Phishing and Spoofing attacks
- Social Engineering
- Using Network Packet Analyzers
- Ethical Hacking
- Foot printing
- Open Source Security Scanning tools like NMAP
- Using Kali Linux for exploring various Ethical Hacking Tools