Ethical Hacking and Penetration Testing
What you'll learn
- In this course, you will learn:
- Overview of Information and Cyber Security
- Hacking and Ethical Hacking concepts
- Five Phases of Hacking
- Using tools for scanning and Vulnerability Assessment
- Malware based Attacks
- Man-in-the-Middle Attack
- VAPT of Web Servers and Web Application Servers
- Wireless Hacking
- For taking this course, knowledge about Networking Basics and Servers will be an essential.
- Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
- Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
VAPT of Web Servers and Web Application Servers
This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
For taking this course, knowledge about Networking Basics and Servers will be an essential.
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Module 1 : Introduction to Information Security
Information Security Overview
Hacking and Ethical Concepts
Information Security Controls
Penetration Testing Overview
Module 02 : Footprinting
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Module 03: Scanning Networks
Understanding TCP Flags
Network Scanning Concepts
Module 04: Enumeration
Enumeration Methods and Tools
Module 05: Vulnerability Assessment
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Module 07: Malware Threats
Virus and Worm Concepts
Module 08: Sniffing
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Module 09: Web Servers/Application VAPT
Web Server/Application Assessment Methodology
Web Server/Application Assessment Tools
Web Server/Application VAPT and Reporting
Module 10: Wireless Network VAPT
Wi-Fi Authentication Modes
Wireless Encryption Protocols
Wireless Network VAPT and Reporting
Who this course is for:
- This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
A technocrat with over 22 Years of total experience in INFRASTRUCTURE MANAGEMENT SERVICE with technical expertise in Implementation, Datacenter Operations, Cloud Infrastructure, Cyber Security, Support and Training on most of the industry standard latest technologies.
Certified Ethical Hacker ( CEH )
Computer Hacker Forensic Investigator ( CHFI )
Certified EC-Council Instructor ( CEI )
Citrix Certified Associate ( CCA )
Microsoft Certified System Administrator ( MCSA )
IBM Certified AIX Administrator