Course Introduction

The RCCE constitutes two in-depth levels. RCCE Level 1 delves into the detailed aspects of threats, attacks and defenses in cybersecurity, and is a process of learning scripting languages to fix loopholes in webportals, networks and apps. RCCE Level 2 leaves no stone unturned as training is given on advanced hacking techniques with interesting case studies, including futuristic technologies such as advanced cloud security, cryptography, quantum computing and more.

Click here for more information.

RCCE – Level 1 Program Outline

Module 1: Cybersecurity threats, attacks and defenses
Module 2: Information gathering and network scanning
Module 3: Cyber Vulnerabilities
Module 4: Web Application Attacks
Module 5: Web shells, Spywares and Backdoors
Module 6. Denial of Service Attacks
Module 7: Packet Sniffers and Network Analyzers
Module 8: Password Cracking
Module 9: Wireless Hacking
Module 10: Firewalls and IDS
Module 11: Hacking Frameworks
Module 12: Cryptography
Module 13: Malware attacks
Module 14: Phishing Attacks
Module 15: Hacking Facebook, Twitter, WhatsApp and Others
Module 16: Hacking Cloud Computing
Module 17: Hacking Cloud networks
Module 18: Supply Chain Attacks
Module 19: Mobile Phone Hacking
Module 20: Webserver Hacking
Module 21: Patch management
Module 22: Malware analysis
Module 23: Penetration Testing
Module 24: Policies and Procedures
Module 25: Incident Response
Module 26: Artificial Intelligence in Cybersecurity
Module 27: Cyberthreat Intelligence
Module 28: Scripting Languages
Module 29: Network Defender

RCCE – Level 2 Program Outline

Module 1: Sophisticated and Extremely Advanced Phishing Techniques Harvested by Chinese and Russian Hackers
Module 2: Deep Network Insights for Deeper Analytics
Module 3: Read Privileged Kernel Memory and Leak Data to Escalate Privileges
Module 4: Advanced Blockchain Exploits and Cryptocurrency Mining Attacks
Module 5: Sophisticated Government use of Cyberweapon Attacks and How they work
Module 6: Principles of Quantum Entanglement to Secure Communication (Unhackable networks)
Module 7: Guidance For Cybersecurity Disclosure and Advanced Techniques for Cyber Bounty hunting
Module 8: Advanced Mobile Banking and ATM Trojans
Module 9: Quantum Computing and Cryptography
Module 10: Dark Web and How to Download Sophisticated Stealth Tools
Module 11: Advanced Cloud Security – Azure, AWS, Digital Ocean, Google VM.
Module 12: H2O Driverless AI, Amazon SageMaker, and Azure Machine Learning AutoML
Module 13: Deepfakes and Generating Automated Fake news
Module 14: Advanced Threat Modelling Attacks
Module 15:  Cognitive-Powered Security Intelligence Platform
Module 16: Advanced Ransomware and Cryptojacking Attacks
Module 17: Open Source Intelligence in Cybersecurity
Module 18: Attacking AI Chatbot and Voice Assistants – Siri, Google Home and Alexa
Module 19: DeepLocker: How AI Can Power a Stealthy New Breed of Malware
Module 20: Cybersecurity Insurance
Module 21: Advanced File System Protection With Cyber Deception
Module 22: Legal AI: How Machine Learning Is Aiding, Concerning Law Practitioners
Module 23: Advanced Threat Hunting Techniques
Module 24: Vulnerability Management Process Based on Weaponization and Asset Value
Module 25: Passwordless Authentication With FIDO
Module 26: Advanced PowerShell Attacks
Module 27: Next Generation of the Cyber Range Attacks
Module 28: Advanced Payment Gateway and Financial Cyberattacks
Module 29: Developing Immersive Cybersecurity Simulation
Module 30: Advanced DDOS Attacks Using IoT Botnets
Module 31: Attacking Hidden Endpoint Management Firewalls and IDS
Module 32: Advanced BGP Router Attacks
Module 33: Machine Learning with Automated Software Vulnerabilities
Module 34: Hacking Medical IoT Devices
Module 35: Hacking Biometric Security, and Facial Recognition Systems
Module 36: Threat Intelligence Models for Cyber Warfare
Module 37: Artificial Intelligence and Cyberwarfare
Module 38: Hacking Connected Cars
Module 39: Hacking Power Grids
Module 40: Advanced Mobile Phone Hacking, Spying, GPS and Monitoring
Module 41: Home Automation and IoT Gadgets
Module 42: How To Use Tensorflow
Module 43: Advanced EMP Cyberattacks
Module 44: Hacking heart devices, pacemakers, insertable cardiac
Module 45: Integrating IoT Security Into  Vulnerability Management Program
Module 46: Containers & Cloud Native Security

  • A 10-day Training Program ( Level 1 – 5 days, Level 2 – 5 days )
  • The provision of an active web portal
  • Seminars conducted by qualified engineers
  • Cyberrange® access to online labs
  • Best in-class environment

(* We believe our training will ensure that you are well prepared to crack the exam. In the rare and unfortunate event where you have to appear for a second attempt, we’ll sign you up at no cost)

Certification Details

  • Cyberclass or Pearson VUE Exam
  • Number of Questions: 90
  • Test Duration: 90 Minutes
  • Test Format: Multiple Choice

Who should attend

Individuals who wish to build a career in cybersecurity
across the following industries:

  • Healthcare
  • Smart Cities
  • Industry 4.0
  • Transportation
  • Electronics
  • Governance
  • Automation
  • Robotics
  • Telecom
  • Smart Appliances
  • Department of Defense
  • Finance

Training Outcomes

In the RCCE program you will learn to:

  1. Utilize vulnerabilities to identify if unauthorized activity is possible.
  2. Carry out e­ective penetration tests.
  3. Understand advanced cybersecurity solutions.
  4. Complement RCCE foundation, advanced RCCE imparts specialist knowledge on persistent privacy problems, IoT vulnerabilities, penetration testing, insecure networks and other specialist concepts.
  5. Understand the types of cryptography and its history, encryption, data protection, key generation algorithms, RSA security and cryptography.
  6. Mail authentication tokens, authorization, and implementation of private servers.

  • Module 01: Governance – Introduction , Issues and Challenges
  • Module 02: IT Governance and Control Frameworks
  • Module 03: COBIT 5 Principles Overview
  • Module 04: Meeting Stakeholder Needs
  • Module 05: Covering the Enterprise End to End
  • Module 06: Applying a Single Integrated Framework
  • Module 07: Enabling Holistic Approach
  • Module 08: Separating Governance from Management
  • Module 09: Enablers
  • Module 10: Process Capability Model
  • Module 11: Introduction to COBIT 5 Implementation


  • COBIT 5 – Foundation Reference Material
  • 2 Day training
  • COBIT 5 Foundation – Test Pass Assurance *
  • COBIT 5 Foundation – Online Exam with Peoplecert

(* We believe our training will ensure that you are well prepared to crack the exam. In the rare and unfortunate event where you have to appear for a second attempt, we’ll sign you up at no cost)

Certification Details

  • COBIT 5 Foundation Online Exam
  • Number of Questions: 50
  • Test Duration: 40 Minutes
  • Test Format: Multiple Choice



Who should attend

  • IT Managers
  • Risk Managers
  • IT Auditors
  • IT Consultants
  • Process Owners
  • IT Operational Management
  • IT Business Leadership Management
  • Managers in IT Services

Training Outcomes

The candidate will learn

  1. Gain a holistic understanding of the governance and management of an organization’s internal information systems and technology
  2. Provide top management with an overview of current IT enterprise findings, identifying key problem areas of improvement
  3. Recommend improvements, by implementation aspects of COBIT 5 Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure and end systems


Contact Us

+91 93 848408 00

Request more information

Training Schedules

12th  September 2020

Classroom Course Starts in

Days
Hours
Minutes
Seconds

Signup now

Course Curriculum

Introduction to Software Training Details FREE 00:40:00
Object Oriented Design Patterns Details 00:35:00
Software Testing Details 00:30:00
Advanced Database Development Details 00:25:00
Algorithm analysis Details 00:45:00
Multi Threading in Softwares Details 00:40:00
Managing Software Testing Details 00:20:00
The Software Quiz 00:04:00

Course Reviews

4.3

4.3
4 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

Contact Us

+91 93 848408 00


Request more information

39 STUDENTS ENROLLED
    Accredited Partner

    Looking to train your team?

    Contact Us
    © 2018 Ken & Headway - All rights reserved.
    Quick Enquiry
    close slider

    Your contact information

    I authorize Ken and Headway to contact me on the phone number / email provided here by me .
    X