Curriculum
- 12 Sections
- 11 Lessons
- 10 Weeks
Expanse all sectionsCollapse all sections
- Module 11
- Module 21
- Module 31
- Module 41
- Module 51
- Module 61
- Module 71
- Module 81
- Module 91
- Module 101
- Module 111
- Exams and certification1
There are no students
Requirements
- This training course provides an in-depth understanding of ethical hacking and penetration testing techniques. The course starts with a brief overview of the fundamentals of hacking, followed by an introduction to ethical hacking concepts and tools. You will learn several types of cyber-attacks, prevention techniques and get familiar with diverse types of malwares. You will gain insights into vulnerability assessment, risk management, password cracking, web application exploitation, networks, and wireless security assessments. This training course is focused on providing the skills and knowledge necessary for system administrators to effectively carry out the tasks related to secure networks. You will also be equipped with defensive countermeasures and strategies that are required for identifying threats in information systems. By the end of this training course, participants will have learned how to perform comprehensive ethical hacking processes as well as identify vulnerabilities in organizations’ systems.
Features
- Understand the fundamentals of ethical hacking, including concepts such as foot printing, scanning, enumeration, and exploitation.
- Develop an in-depth knowledge of the several types of attacks and techniques used in penetration testing.
- Learn to identify and remediate potential network vulnerabilities that can be exploited by malicious hackers.
- Acquire hands-on experience with tools used for reconnaissance, vulnerability assessment and exploitation, including public/private exploits/toolsets and open source/commercial solutions.
- Familiarize yourself with the latest security practices and standards used in penetration testing projects by organizations worldwide.
- Carry out penetration testing operations against web applications, networks and system architectures with confidence and accuracy while adhering to legal and ethical guidelines at all times.
- Gain an understanding of how to analyse the data gathered during a security assessment – Use this information to determine which exploits may be successful; generate detailed reports; prioritize findings; make recommendations for improvement; track progress over time based on historical data etcetera
- Understand countermeasures (eavesdropping prevention, encryption etc.) that can protect an organization from unethical attackers or malicious users attempting to exploit security vulnerabilities or gain confidential information illegally