Mode of Classes
Live Interactive sessions via Zoom Platform
Description of the Course
This course will be demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.
Ethical hacking is performed by an individual or a company to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers.
Course will give you fundamental concepts of ethical hacking which includes info gathering, vulnerability analysis, types of attacks and methods exploitation tools and vulnerability reporting ecosystem
Operating System Required: Software- kali linux (either installed directly or under Vmare )
Prerequisites
- Having knowledge of computer science which includes basic networking and operating system concepts
Topics to be covered
Learning Outcomes
Course will give you fundamental concepts of ethical hacking which includes info gathering, vulnerability analysis, types of attacks and methods exploitation tools and vulnerability reporting ecosystem.
It enables students to handle information security with more simplicity.
Helps to know the finer nuances of backdoors, trojans and countermeasures.
Better cognizance of IDS, advanced log management for information assurance.