Ethical Hacking Foundation - Part 2
What you'll learn
- You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks.
- You will have a firm understanding of places of hacking and mind map.
- You will gain insights of denial of service and distributed denial of service
- You will gain clality on syn flooding attach using hping3, counter measures and Metasploit test.
- You should have completed the previous course in order to continue learning. Course : Ethical Hacking Foundation - Part 1
You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.
Section 1: Components of Hacking:
Section 2: Ethical hacking Mindmap
Places of ethical hacking
Section 3: DoS and DDoS
Denial of services
Symptoms of dos attack
Increase in spam emails
Unavailability of a resource
Loss of access to a website
Denial of access to any internet services
Distributed denial of services (DDoS)
DoS/DDoS attack techniques
Land and flood attacks
Service request floods
Section 4: SYN flooding attach using hping3
Section 5: Counter Measures
DoS/DDoS countermeasure strategies
Detech and neutralize handlers
Monitoring the activities running on a system of network
Deflect attacks by load balancing
Mitigate attacks disabling unnecessary services
Intrusion detection systems
Section 6: Metasploit test
Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make
systems more secure. Metasploit is available for all popular operating systems.
Type of Cybercrime
The following list presents the common types of cybercrimes:
Computer Fraud: Intentional deception for personal gain via the use of computer systems.
Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.
Identity Theft: Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering: This involves the use of the computer to launder money.
ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
Spam: Sending unauthorized emails. These emails usually contain advertisements.
Good Match for me ~ Chan Aye
Nice One.. It take us one step ahead in cyber security ~ Anoop Kumar
this is good way to learn ~ Roshan Kumar
Yes this is best lecture ~ SHOEB IQBAL ANSARI
It's awesome ~ A Md Thoufiq
I gain more knowledge about this subject ~ Gary June D Benoya
Who this course is for:
- Students and Professionals interested in a career in Cyber Security and Ethical Hacking
- This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.
We specialize in Cybersecurity, Data Science and Talent Management/Human capital management training. The USP of all our training's is the hands-on that we provide, our focus is on real-life practical knowledge sharing, and not tool-based PPT slides. All our training's are conducted by highly experienced practitioners who are dyed-in-the-wool penetration testers. The material is cutting edge and updated with even the most recent developments. We have a standard set of courses outlined in different information security domains, data analytics domains and Talent management domain. However, we also customize the training according to the clients’ requirements.