Certified Cybersecurity
Engineer RCCE
About this Course
The RCCE® Level 1 covers the foundation concepts of hacking. This course will give you a detailed, in-depth knowledge and hands-on labs. You will have mastery over hacking technologies and tools. The course covers Web application attacks, Trojans and Malware, Ransomware, Denial of Service attacks, metasploit, man-in-the middle attacks, android hacking, Wifi, Bluetooth, NFC, phishing attacks, Artificial Intelligence, Cryptocurrency and Blockchain, Fake news, Kubernetes, Facial Recognition, Ethereum Dapps, Quantum Computing, GPS programming, Solidity, Node JS, Perl, Python, ruby, Bash shell scripting among others, firewalls, cryptography, cracking passwords, hacking the cloud etc.


About this Course
RCCE® Level 2 is a futuristic, advanced hacking course. The student should have gone through the RCCE® Level 1 program which is a mandatory requirement. The student should also have a working understanding of the essentials of hacking tools and cybersecurity solutions. In Level 2, trainees will get a hands on knowledge of analytical tools and advanced techniques including penetration testing and other innovative solutions and protocol to counter sophisticated security breach.
Modules

Cybersecurity Threats, Attacks and Defenses

Reconnaissance/ Cloud Technologies

Cyber vulnerabilities

Web Application Attacks

Webshells, Spywares and Backdoors

Denial of Service Attacks

Packet Sniffers And Network Analyzers

Password Cracking

Wireless Hacking

Cloud Firewalls And IDS

Hacking Frameworks

Cryptography

Phishing Attacks

Malware Analysis

Hacking Smart Objects

Hacking Power Grids

Hacking Connected Cars

Hacking Mobile Phones

Hacking The Cloud Networks
