The course on Ethical Hacking and Penetration Testing equips participants with the necessary expertise to become a proficient Security Professional. It imparts knowledge crucial for conducting penetration tests, identifying vulnerabilities, and implementing corrective measures to lessen the likelihood of attacks. Throughout the course, participants will engage with advanced tools in practical scenarios to pinpoint, observe, and exploit any discovered weaknesses within a targeted network environment. A distinctive feature of this course is its emphasis on hands-on demonstrations, which complement the theoretical knowledge imparted.
Fundamentals of Information Security
- Overview of Information Security
- Understanding Ethical Hacking and Its Principles
- Stages of Hacking
- Measures for Information Security
- Basics of Penetration Testing
Exploring Digital Footprints
- Basics of Footprinting
- Utilizing Search Engines for Footprinting
- Leveraging Web Services for Footprinting
- Footprinting via Social Media Platforms
Network Scanning
- Exploring TCP Flags
- Fundamentals of Network Scanning
- Various Scanning Approaches
- Devices Used in Scanning
Techniques of Enumeration
- Basics of Enumeration
- Enumeration Strategies and Instruments
Conducting Vulnerability Assessments
- Principles of Vulnerability Assessment
- Solutions for Vulnerability Assessment
- Systems for Rating Vulnerabilities
- Instruments for Vulnerability Assessment
- Compiling Vulnerability Assessment Reports
Penetrating Systems
- Concepts in System Penetration
- Techniques for Password Cracking
- Privilege Elevation Methods
- Application Execution
- File Concealment
- Erasing Evidence
Understanding Malware Threats
- Introduction to Malware
- Malware Concepts
- Trojan Concepts
- Virus and Worm Concepts
- Malware Analysis and Countermeasures
- Anti-Malware Software
Exploring Sniffing Techniques
Understanding Sniffing
- Sniffing Concepts
Various Sniffing Techniques
- MAC Attacks
- DHCP Attacks
- ARP Poisoning
- Spoofing Attacks
- DNS Poisoning
Web Servers and Application Vulnerability Assessment and Penetration Testing (VAPT)
- Web Server and Application Assessment
- Assessment Methodology
- Assessment Tools
- VAPT and Reporting
Wireless Network Vulnerability Assessment and Penetration Testing (VAPT)
Wireless Network Security
- Wi-Fi Authentication Modes
- Wireless Encryption Protocols
VAPT for Wireless Networks
- VAPT Process
- Reporting and Analysis
This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
- Great course! 5 stars. Very interestingly structured and presented comprehensibly. All topics are really explained in great detail, by explaining the material step-by-step, the content remains in the head. Thank you ILANCHEZHIAN K for this great and unforgettable opportunity. I am really enthusiastic and can only recommend this course for those interested ~ Waldemar S
- The instructor make it so simple, i love it. :) ~ Abdalrhman H
- This a very very awesome course. It is very simple to understand and based on 95% practical explanation ~ M Sunil
- Overview of Information and Cyber Security
- Hacking and Ethical Hacking concepts
- Five Phases of Hacking
- Using tools for scanning and Vulnerability Assessment
- Malware based Attacks
- Man-in-the-Middle Attack
- VAPT of Web Servers and Web Application Servers
- Wireless Hacking
- For taking this course, knowledge about Networking Basics and Servers will be an essential.
- Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
- Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.