Cyber Security Penetration Testing Tools Course
3.6 (193 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
11,274 students enrolled

Cyber Security Penetration Testing Tools Course

Learn & understand Cyber Security from scratch
New
3.6 (197 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
12,067 students enrolled
Last updated 6/2020
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 34 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Basics Of CEH
  • Learn About Penetration Testing and Tools
  • Malware Analysis
Requirements
  • Basic IT Skills
  • Operating System: Windows / OS X / Linux.
Description

Certified Ethical Hacker (CEH) is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.

Who this course is for:
  • Anybody interested in learning how to secure systems from hackers
Course content
Expand 6 lectures 33:51
+ Cyber Security Penetration Testing Tools Course
6 lectures 33:51
Basics Of CEH - Part 2
05:26
Learn About Penetration Testing and Tools - Part 1
05:38
Learn About Penetration Testing and Tools - Part 2
05:17
Learn About Penetration Testing and Tools - Part 3
05:09
Malware Analysis
05:47