Complete Ethical Hacking Online | 40 Sessions |

Share
₹ 60,000
Description

Mode of Classes
Live Interactive sessions via Zoom Platform

Description of the Course

This course will be demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.

Ethical hacking is performed by an individual or a company to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.

Course will give you fundamental concepts of ethical hacking which includes info gathering, vulnerability analysis, types of attacks and methods exploitation tools and vulnerability reporting ecosystem

Operating System Required: Software- kali linux (either installed directly or under Vmare )

Prerequisites
- Having knowledge of computer science which includes basic networking and operating system concepts

Topics to be covered

  1. Introduction
  2. Kalinix overview
  3. Navigating the file system
  4. User and privileges
  5. Basics of networking and wireless cracking using air crack
  6. Database assessment and attacks
  7. Web application analysis, using SQL map and WP scan
  8. Password attacks using OPH crack and jack the ripper
  9. Vulnerability reporting methods
  10. Career advice and path

Learning Outcomes

Course will give you fundamental concepts of ethical hacking which includes info gathering, vulnerability analysis, types of attacks and methods exploitation tools and vulnerability reporting ecosystem.

 It enables students to handle information security with more simplicity.
 Helps to know the finer nuances of backdoors, trojans and countermeasures.
Better cognizance of IDS, advanced log management for information assurance.