Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA CompTIA Security+ Amazon AWS Microsoft AZ-900
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Personal Transformation Mindfulness Life Purpose Meditation CBT Emotional Intelligence
Web Development JavaScript React CSS Angular PHP Node.Js WordPress Vue JS
Google Flutter Android Development iOS Development React Native Swift Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
Microsoft Power BI SQL Tableau Business Analysis Data Modeling Business Intelligence MySQL Data Analysis Blockchain
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Business Plan Startup Freelancing Online Business Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

The 2021 Cyber Security Beginners Guide: Part 2 - Hacking

Gain the knowledge hackers use to compromise systems and use it to protect your own!
Rating: 3.7 out of 53.7 (231 ratings)
67,616 students
Created by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Last updated 12/2019
English
30-Day Money-Back Guarantee

What you'll learn

  • You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.

Requirements

  • You should have completed two previous courses in order to continue learning. Course 1: Absolute Beginners Guide to Cybersecurity and Hacking Course 2: Absolute Beginners Guide to Cyber Security Part 1

Description

You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.


Section 1: Components of Hacking:

Reconnaissance

Scanning

Gaining access

Maintaining access

Clearing tracks


Section 2: Ethical hacking Mindmap

Ethical hacking

Places of ethical hacking

Mind map


Section 3: DoS and DDoS

Denial of services

Symptoms of dos attack

Slow performance

Increase in spam emails

Unavailability of a resource

Loss of access to a website

Denial of access to any internet services

Distributed denial of services (DDoS)

DoS/DDoS attack techniques

Land and flood attacks

Service request floods


Section 4: SYN flooding attach using hping3


Section 5: Counter Measures

Counter-measures

DoS/DDoS countermeasure strategies

Detech and neutralize handlers

Monitoring the activities running on a system of network

Deflect attacks by load balancing

Mitigate attacks disabling unnecessary services

Intrusion detection systems

Wavelet analysis


Section 6: Metasploit test

Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make

systems more secure. Metasploit is available for all popular operating systems.

Vulnerability

Exploit

Payload

Meterpreter


Type of Cybercrime

  • The following list presents the common types of cybercrimes:

  • Computer Fraud: Intentional deception for personal gain via the use of computer systems.

  • Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.

  • Identity Theft: Stealing personal information from somebody and impersonating that person.

  • Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.

  • Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.

  • Electronic money laundering: This involves the use of the computer to launder money.

  • ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.

  • Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

  • Spam: Sending unauthorized emails. These emails usually contain advertisements.


Who this course is for:

  • Students and Professionals interested in a career in Cyber Security and Ethical Hacking
  • This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

Course content

6 sections • 6 lectures • 1h 51m total length

  • Preview40:21

  • Preview08:21

  • DoS and DDoS
    27:04

  • SYN flooding attack using hping3
    15:24

  • DoS/DDoS Counter Measure Strategies
    10:38

  • Metasploit Test Demo
    09:43

Instructor

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
Cybersecurity, Data Science & Human Capital Practitioners!
Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!
  • 4.1 Instructor Rating
  • 4,885 Reviews
  • 273,130 Students
  • 42 Courses

We specialize in Cybersecurity, Data Science and Talent Management/Human capital management training. The USP of all our training's is the hands-on that we provide, our focus is on real-life practical knowledge sharing, and not tool-based PPT slides. All our training's are conducted by highly experienced practitioners who are dyed-in-the-wool penetration testers. The material is cutting edge and updated with even the most recent developments. We have a standard set of courses outlined in different information security domains, data analytics domains and Talent management domain. However, we also customize the training according to the clients’ requirements.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.