Advanced Diploma in Information Security & Ethical Hacking (ADIE)


cehEthical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testingintrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions:

1. What information/locations/systems can an attacker gain access?

2. What can an attacker see on the target?

3. What can an attacker do with available information?

4. Does anyone at the target system notice the attempts?

An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts.

The course gives broad knowledge about information security and Ethical hacking. The course is specially designed and is a complete course as it starts from the basics and later covers all related concepts. This course enables the candidate to work on latest platforms like Windows 8, Windows Server 2012, Linux, etc.

Industry Overview:

Ethical hacking was estimated to be a US$ 3.8 billion industry last year but its grown more. Salaries range from £30,000 to £ 60,000 per annum or £300 and above per day. The information Security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 4.2 million information security professionals worldwide which is expected to increase to nearly 6.2 million by 2020.

Course Pattern

Semester – 1

ModuleDuration (Instructional Hours)
Logic Building and Elementary Programming40
Basics of HTML5 and Java Scripting20
Network technologies Part – 132
Operational Security40

Learning Objectives – Semester 1

  • Explain basic structure and tags of HTML5
  • Explain JavaScript basics
  • Describe steps for installation, configuration media and topologies
  • Explain network management and security
  • Explain administrative controls
  • Describe physical controls, logical controls, perimeter security controls and access control
  • Explain how to identify & authenticate
  • Explain Information Security Awareness
  • Explain Audit and Compliance, Logs and Monitoring, Backup types
  • Describer different types of backup

Semester – 2

ModuleDuration (Instructional Hours)
Network Technologies Part – II32
Information Security and Organizational
Introduction to Ethical Hacking20
Social Engineering and User Awareness20
Risk Management20

Learning Objectives – Semester 2

  • Configure, verify, troubleshoot basic router operation and routing on Cisco/Juniper devices
  • Identify security threats to a network and describe general methods to mitigate those threats
  • Explain concepts like Intranet security, describe Managements like Change, Incident & Patch
  • Describe General cyber laws/standards, Identifies Information security policies & Procedures
  • Identify organizational level, system level, administrative level and Issue Specific Policies
  • Explain Penetration Testing & Information Gathering
  • Describe Foot printing, Detecting Live Systems, Reconnaissance, Enumeration and Vulnerability assessment
  • Explain definition of Social Engineering & goals of Social Engineering
  • Describe types of Social Engineering and Classification of Information security assets
  • Identify threat, Risk Vulnerabilities & Information security controls
  • Explain purpose of risk management, Business Impact analysis & Quantitative Analysis

Semester – 3

ModuleDuration (Instructional Hours)
Configuring a Network Infrastructure30
Linux System Administration40
Mobile Computing and Cloud Computing30
Windows Server Administration and

Learning Objectives – Semester 3

  • Explain Installation and Configuration of Windows Server
  • Describe configuration of Server Roles and Features
  • Explain Deployment and Configuration of core network services
  • Explain Installation and Administering Active Directory and creating and Managing Group policies
  • Describe how to install, configure and administer the newest version of Red Hat Linux Server
  • Describe Linux security and shell scripting
  • Describe different types of Mobile OS & devices
  • Explain different mobile protocols and networking
  • Explain basics of cloud computing & server administration
  • Describe how to assign CA, DNS, and DHCP

Semester – 4

ModuleDuration (Instructional Hours)
WAN Security and Wireless Technology40
Database Management (Database Security
and Development)
Security Models and Evaluation

Learning Objectives – Semester 4

  • Explain different WAN technologies and securities
  • Explain different wireless technologies and securities
  • Explain different types of database models
  • List and describe ways to prevent attacks
  • Explain cryptography
  • List different types of encryption algorithms
  • List advantages and disadvantages of different types of encryption algorithms
  • Explain different types of security models
  • List and describe security kernel requirements

Semester – 5

ModuleDuration (Instructional Hours)
Programming with Python and HTML5
Software Development Security24
Security Architecture & Hacking40
Handheld Devices Security16
Cloud Security20

Learning Objectives – Semester 5

  • Explain various concepts in Python like flow control , list , functions, etc
  • Explain types, variables and Input/output
  • Describe security in Embedded Systems
  • Explain Development Methodologies, Maturity Models, & Security Issues
  • Describe ActiveX Security, Java, and Applets
  • Explain Common Gateway Interface working of CGI Scripts &Describe Modularity of Objects
  • Explain Object-Oriented Programming Characteristic & Architecture Components
  • Explain Key Architecture Concepts –Plan & Describe Objectives of Security Architecture
  • Explain technology domain modeling, Integrated Security is Designed Security & Memory Management
  • Describe Accessing Memory Securely & lists types of Compromises
  • Explain the various attack types & Secure Mobile networks
  • Describe different hand held devices, their vulnerabilities & different types of cloud security

Semester – 6

ModuleDuration (Instructional Hours)
Advanced Ethical Hacking48
BCP/DR(Business Continuity &
Disaster Management)
Windows/Unix/Linux Hacking &
Computer Forensics

Learning Objectives – Semester 6

  • Explain BCP Development
  • Explain Critical products and services
  • Identify Vulnerabilities and Threats
  • Identify Function Resources
  • Describe Operation Time Without Resources
  • Calculate MTD, RTO, & Recovery Point Objective
  • Calculate maximum data loss
  • Explain different hacking methods in Windows OS
  • Explain different hacking methods in Linux/UNIX
  • Explain Computer Forensics


SemesterCertificate name
Semester 1Certificate in Network
Technologies (CNT)
Semester 2Diploma in Information
Security (DIS)
Semester 3No Exit
Semester 4Higher Diploma in
Information Security (HDIS)
Semester 5No Exit
Semester 6Advanced Diploma in
Information Security & Ethical Hacking (ADIE)

The Route to an International Degree


The ADIE course entitles you to transfer your credits and gain entry into the Final Year of B.Sc. (Hons.) Degree as per details given below.

Study ADIE at Aptech

Advanced Diploma in Information Security & Ethical Hacking (ADIE)


B.Sc. (Hons) from Middlesex University

Study in London, Dubai Mauritius and Malta


B.Sc. (Hons) Information Technology

B.Sc. (Hons) Information Technology & Business Information Systems

B.Sc. (Hons) Computer Networks

B.Sc. (Hons) Computer Science (Systems Engineering)


Preferred University Partner


DISCLAIMER: In our effort to serve our customers better, the courses are upgraded to add new technologies and the course outline may change accordingly. The credit transfer arrangement or the University alliance may change over time. The customer is requested to check the exact course outline and credit transfer arrangement at the centers before enrolling for a particular course. All trademarks acknowledged.