image
image

Ethical Hacking and Pen Testing: A Complete Guide

Equip yourself with expertise to conduct penetration tests, identify vulnerabilities and implement corrective measures to enhance information security.

188 views
Last updated 2/2024 English

Buy only this course for S$29.85 S$22.35

Or

Add to Wishlist
image

Overview

The course on Ethical Hacking and Penetration Testing equips participants with the necessary expertise to become a proficient Security Professional. It imparts knowledge crucial for conducting penetration tests, identifying vulnerabilities, and implementing corrective measures to lessen the likelihood of attacks. Throughout the course, participants will engage with advanced tools in practical scenarios to pinpoint, observe, and exploit any discovered weaknesses within a targeted network environment. A distinctive feature of this course is its emphasis on hands-on demonstrations, which complement the theoretical knowledge imparted.

Fundamentals of Information Security

  • Overview of Information Security
  • Understanding Ethical Hacking and Its Principles
  • Stages of Hacking
  • Measures for Information Security
  • Basics of Penetration Testing

Exploring Digital Footprints

  • Basics of Footprinting
  • Utilizing Search Engines for Footprinting
  • Leveraging Web Services for Footprinting
  • Footprinting via Social Media Platforms

Network Scanning

  • Exploring TCP Flags
  • Fundamentals of Network Scanning
  • Various Scanning Approaches
  • Devices Used in Scanning

Techniques of Enumeration

  • Basics of Enumeration
  • Enumeration Strategies and Instruments

Conducting Vulnerability Assessments

  • Principles of Vulnerability Assessment
  • Solutions for Vulnerability Assessment
  • Systems for Rating Vulnerabilities
  • Instruments for Vulnerability Assessment
  • Compiling Vulnerability Assessment Reports

Penetrating Systems

  • Concepts in System Penetration
  • Techniques for Password Cracking
  • Privilege Elevation Methods
  • Application Execution
  • File Concealment
  • Erasing Evidence

Understanding Malware Threats

  • Introduction to Malware
  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis and Countermeasures
  • Anti-Malware Software

Exploring Sniffing Techniques

Understanding Sniffing

  • Sniffing Concepts

Various Sniffing Techniques

  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attacks
  • DNS Poisoning

Web Servers and Application Vulnerability Assessment and Penetration Testing (VAPT)

  • Web Server and Application Assessment
  • Assessment Methodology
  • Assessment Tools
  • VAPT and Reporting

Wireless Network Vulnerability Assessment and Penetration Testing (VAPT)

Wireless Network Security

  • Wi-Fi Authentication Modes
  • Wireless Encryption Protocols

VAPT for Wireless Networks

  • VAPT Process
  • Reporting and Analysis
Who this course is for

This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.

Testimonials
  1. Great course! 5 stars. Very interestingly structured and presented comprehensibly. All topics are really explained in great detail, by explaining the material step-by-step, the content remains in the head. Thank you ILANCHEZHIAN K for this great and unforgettable opportunity. I am really enthusiastic and can only recommend this course for those interested ~ Waldemar S
  2. The instructor make it so simple, i love it. :) ~ Abdalrhman H
  3. This a very very awesome course. It is very simple to understand and based on 95% practical explanation ~ M Sunil
What you'll learn
  1. Overview of Information and Cyber Security
  2. Hacking and Ethical Hacking concepts
  3. Five Phases of Hacking
  4. Using tools for scanning and Vulnerability Assessment
  5. Malware based Attacks
  6. Man-in-the-Middle Attack
  7. VAPT of Web Servers and Web Application Servers
  8. Wireless Hacking
Requirements
  1. For taking this course, knowledge about Networking Basics and Servers will be an essential.
  2. Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
  3. Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.