Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing, available at $69.99, has an average rating of 4.6, with 37 lectures, based on 145 reviews, and has 18541 subscribers.
You will learn about In this course, you will learn: Overview of Information and Cyber Security Hacking and Ethical Hacking concepts Five Phases of Hacking Using tools for scanning and Vulnerability Assessment Malware based Attacks Man-in-the-Middle Attack VAPT of Web Servers and Web Application Servers Wireless Hacking This course is ideal for individuals who are This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals. It is particularly useful for This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
Enroll now: Ethical Hacking and Penetration Testing
Summary
Title: Ethical Hacking and Penetration Testing
Price: $69.99
Average Rating: 4.6
Number of Lectures: 37
Number of Published Lectures: 37
Number of Curriculum Items: 37
Number of Published Curriculum Objects: 37
Original Price: ₹2,499
Quality Status: approved
Status: Live
What You Will Learn
- In this course, you will learn:
- Overview of Information and Cyber Security
- Hacking and Ethical Hacking concepts
- Five Phases of Hacking
- Using tools for scanning and Vulnerability Assessment
- Malware based Attacks
- Man-in-the-Middle Attack
- VAPT of Web Servers and Web Application Servers
- Wireless Hacking
Who Should Attend
- This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
Target Audiences
- This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
-
Overview of Information and Cyber Security
-
Hacking and Ethical Hacking concepts
-
Five Phases of Hacking
-
Using tools for scanning and Vulnerability Assessment
-
Malware based Attacks
-
Man-in-the-Middle Attack
-
VAPT of Web Servers and Web Application Servers
-
Wireless Hacking
Target Audience
This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
Prerequisites
-
For taking this course, knowledge about Networking Basics and Servers will be an essential.
-
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
-
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Module 1 : Introduction to Information Security
-
Information Security Overview
-
Hacking and Ethical Concepts
-
Hacking Phases
-
Information Security Controls
-
Penetration Testing Overview
Module 02 : Footprinting
-
Footprinting Concepts
-
Footprinting through Search Engines
-
Footprinting through Web Services
-
Footprinting through Social Networking Sites
Module 03: Scanning Networks
-
Understanding TCP Flags
-
Network Scanning Concepts
-
Scanning Techniques
-
Scanning Devices
Module 04: Enumeration
-
Enumeration Concepts
-
Enumeration Methods and Tools
Module 05: Vulnerability Assessment
-
Vulnerability Assessment Concepts
-
Vulnerability Assessment Solutions
-
Vulnerability Scoring Systems
-
Vulnerability Assessment Tools
-
Vulnerability Assessment Reports
Module 06: System Hacking
-
System Hacking Concepts
-
Cracking Passwords
-
Escalating Privileges
-
Executing Applications
-
Hiding Files
-
Covering Tracks
Module 07: Malware Threats
-
Malware Concepts
-
Trojan Concepts
-
Virus and Worm Concepts
-
Malware Analysis
-
Countermeasures
-
Anti-Malware Software
Module 08: Sniffing
-
Sniffing Concepts
-
Sniffing Technique: MAC Attacks
-
Sniffing Technique: DHCP Attacks
-
Sniffing Technique: ARP Poisoning
-
Sniffing Technique: Spoofing Attacks
-
Sniffing Technique: DNS Poisoning
Module 09: Web Servers/Application VAPT
-
Web Server/Application Assessment Methodology
-
Web Server/Application Assessment Tools
-
Web Server/Application VAPT and Reporting
Module 10: Wireless Network VAPT
-
Wi-Fi Authentication Modes
-
Wireless Encryption Protocols
-
Wireless Network VAPT and Reporting
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction to Ethical Hacking
Lecture 2: CIA
Lecture 3: Hacking Phases
Lecture 4: Bug Bounty Program
Chapter 2: Reconnaissance
Lecture 1: Reconnaissance Introduction
Lecture 2: Footprinting
Lecture 3: Footprinting Demo
Chapter 3: Scanning
Lecture 1: Scanning
Lecture 2: Network Discovery
Lecture 3: Port Scanning using NMAP
Lecture 4: Capturing and Analyzing Packets using Wireshark
Lecture 5: Understand TCP Flags
Lecture 6: Scanning beyond IDS and Firewall
Lecture 7: Idle Scan or Zombie Scan
Chapter 4: Vulnerability Scanning
Lecture 1: Introduction to Vulnerability Scanning
Lecture 2: Vulnerability Scanning Demo
Lecture 3: Vulnerability Scanning Using Nessus
Chapter 5: Gaining Access
Lecture 1: Gaining Access
Lecture 2: Gaining Access to Windows 10 System
Lecture 3: Privilege Escalation
Chapter 6: Maintaining Access
Lecture 1: Maintaining Access
Lecture 2: Clearing Tracks
Chapter 7: Malware
Lecture 1: Malware
Lecture 2: Malware Demo
Lecture 3: Using Crypter to Keep Malware Undetected by Antivirus
Chapter 8: Sniffing
Lecture 1: Sniffing
Lecture 2: MAC Flooding
Lecture 3: DHCP Attacks
Lecture 4: DNS Attacks
Lecture 5: ARP Poisoning
Chapter 9: Web Server Attacks
Lecture 1: Web Server Attacks
Lecture 2: DDoS Attack
Lecture 3: Phishing Attack
Lecture 4: SSH Brute Force Attack
Lecture 5: Web Application Attack
Chapter 10: Wireless Network Attack
Lecture 1: Understand Wireless Network Authentication and Encryption
Lecture 2: Wireless Network Attack
Instructors
-
ILANCHEZHIAN. K 1,08,944 Students
Sr. Technical Consultant – COMET
Rating Distribution
- 1 stars: 3 votes
- 2 stars: 4 votes
- 3 stars: 13 votes
- 4 stars: 44 votes
- 5 stars: 81 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Language Learning Courses to Learn in November 2024
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024