Advanced Diploma in Information Security & Ethical Hacking (ADIE)
Introduction:
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security professional who applies their hacking skills for defensive purposes on behalf of the owners of information systems. By conducting penetration tests, an ethical hacker looks to answer the following four basic questions:
1. What information/locations/systems can an attacker gain access?
2. What can an attacker see on the target?
3. What can an attacker do with available information?
4. Does anyone at the target system notice the attempts?
An ethical hacker operates with the knowledge and permission of the organization for which they are trying to defend. In some cases, the organization will neglect to inform their information security team of the activities that will be carried out by an ethical hacker in an attempt to test the effectiveness of the information security team. This is referred to as a double-blind environment. In order to operate effectively and legally, an ethical hacker must be informed of the assets that should be protected, potential threat sources, and the extent to which the organization will support an ethical hacker’s efforts.
The course gives broad knowledge about information security and Ethical hacking. The course is specially designed and is a complete course as it starts from the basics and later covers all related concepts. This course enables the candidate to work on latest platforms like Windows 8, Windows Server 2012, Linux, etc.
Industry Overview:
Ethical hacking was estimated to be a US$ 3.8 billion industry last year but its grown more. Salaries range from £30,000 to £ 60,000 per annum or £300 and above per day. The information Security industry is going at a current worldwide growth rate of 21%. Frost & Sullivan have estimated that there are 4.2 million information security professionals worldwide which is expected to increase to nearly 6.2 million by 2020.
Course Pattern

Semester – 1
Module | Duration (Instructional Hours) |
Logic Building and Elementary Programming | 40 |
Basics of HTML5 and Java Scripting | 20 |
Network technologies Part – 1 | 32 |
Operational Security | 40 |
Total | 132 |
Learning Objectives – Semester 1
- Explain basic structure and tags of HTML5
- Explain JavaScript basics
- Describe steps for installation, configuration media and topologies
- Explain network management and security
- Explain administrative controls
- Describe physical controls, logical controls, perimeter security controls and access control
- Explain how to identify & authenticate
- Explain Information Security Awareness
- Explain Audit and Compliance, Logs and Monitoring, Backup types
- Describer different types of backup
Semester – 2
Module | Duration (Instructional Hours) |
Network Technologies Part – II | 32 |
Information Security and Organizational Structure | 40 |
Introduction to Ethical Hacking | 20 |
Social Engineering and User Awareness | 20 |
Risk Management | 20 |
Project | 24 |
Total | 156 |
Learning Objectives – Semester 2
- Configure, verify, troubleshoot basic router operation and routing on Cisco/Juniper devices
- Identify security threats to a network and describe general methods to mitigate those threats
- Explain concepts like Intranet security, describe Managements like Change, Incident & Patch
- Describe General cyber laws/standards, Identifies Information security policies & Procedures
- Identify organizational level, system level, administrative level and Issue Specific Policies
- Explain Penetration Testing & Information Gathering
- Describe Foot printing, Detecting Live Systems, Reconnaissance, Enumeration and Vulnerability assessment
- Explain definition of Social Engineering & goals of Social Engineering
- Describe types of Social Engineering and Classification of Information security assets
- Identify threat, Risk Vulnerabilities & Information security controls
- Explain purpose of risk management, Business Impact analysis & Quantitative Analysis
Semester – 3
Module | Duration (Instructional Hours) |
Configuring a Network Infrastructure | 30 |
Linux System Administration | 40 |
Mobile Computing and Cloud Computing | 30 |
Windows Server Administration and Services | 40 |
Total | 140 |
Learning Objectives – Semester 3
- Explain Installation and Configuration of Windows Server
- Describe configuration of Server Roles and Features
- Explain Deployment and Configuration of core network services
- Explain Installation and Administering Active Directory and creating and Managing Group policies
- Describe how to install, configure and administer the newest version of Red Hat Linux Server
- Describe Linux security and shell scripting
- Describe different types of Mobile OS & devices
- Explain different mobile protocols and networking
- Explain basics of cloud computing & server administration
- Describe how to assign CA, DNS, and DHCP
Semester – 4
Module | Duration (Instructional Hours) |
WAN Security and Wireless Technology | 40 |
Database Management (Database Security and Development) | 30 |
Cryptography | 12 |
Security Models and Evaluation Criteria | 40 |
Project | 24 |
Total | 146 |
Learning Objectives – Semester 4
- Explain different WAN technologies and securities
- Explain different wireless technologies and securities
- Explain different types of database models
- List and describe ways to prevent attacks
- Explain cryptography
- List different types of encryption algorithms
- List advantages and disadvantages of different types of encryption algorithms
- Explain different types of security models
- List and describe security kernel requirements
Semester – 5
Module | Duration (Instructional Hours) |
Programming with Python and HTML5 Security | 40 |
Software Development Security | 24 |
Security Architecture & Hacking | 40 |
Handheld Devices Security | 16 |
Cloud Security | 20 |
Total | 140 |
Learning Objectives – Semester 5
- Explain various concepts in Python like flow control , list , functions, etc
- Explain types, variables and Input/output
- Describe security in Embedded Systems
- Explain Development Methodologies, Maturity Models, & Security Issues
- Describe ActiveX Security, Java, and Applets
- Explain Common Gateway Interface working of CGI Scripts &Describe Modularity of Objects
- Explain Object-Oriented Programming Characteristic & Architecture Components
- Explain Key Architecture Concepts –Plan & Describe Objectives of Security Architecture
- Explain technology domain modeling, Integrated Security is Designed Security & Memory Management
- Describe Accessing Memory Securely & lists types of Compromises
- Explain the various attack types & Secure Mobile networks
- Describe different hand held devices, their vulnerabilities & different types of cloud security
Semester – 6
Module | Duration (Instructional Hours) |
Advanced Ethical Hacking | 48 |
BCP/DR(Business Continuity & Disaster Management) | 40 |
Windows/Unix/Linux Hacking & Computer Forensics | 60 |
Project | 24 |
Total | 172 |
Learning Objectives – Semester 6
- Explain BCP Development
- Explain Critical products and services
- Identify Vulnerabilities and Threats
- Identify Function Resources
- Describe Operation Time Without Resources
- Calculate MTD, RTO, & Recovery Point Objective
- Calculate maximum data loss
- Explain different hacking methods in Windows OS
- Explain different hacking methods in Linux/UNIX
- Explain Computer Forensics
Certification
Semester | Certificate name |
Semester 1 | Certificate in Network Technologies (CNT) |
Semester 2 | Diploma in Information Security (DIS) |
Semester 3 | No Exit |
Semester 4 | Higher Diploma in Information Security (HDIS) |
Semester 5 | No Exit |
Semester 6 | Advanced Diploma in Information Security & Ethical Hacking (ADIE) |
The Route to an International Degree

The ADIE course entitles you to transfer your credits and gain entry into the Final Year of B.Sc. (Hons.) Degree as per details given below.
Study ADIE at Aptech
Advanced Diploma in Information Security & Ethical Hacking (ADIE)

B.Sc. (Hons) from Middlesex University
Study in London, Dubai Mauritius and Malta
……………………………………………………………….
B.Sc. (Hons) Information Technology
B.Sc. (Hons) Information Technology & Business Information Systems
B.Sc. (Hons) Computer Networks
B.Sc. (Hons) Computer Science (Systems Engineering)
……………………………………………………………
Preferred University Partner

DISCLAIMER: In our effort to serve our customers better, the courses are upgraded to add new technologies and the course outline may change accordingly. The credit transfer arrangement or the University alliance may change over time. The customer is requested to check the exact course outline and credit transfer arrangement at the centers before enrolling for a particular course. All trademarks acknowledged.