Note: 

   

If you guys are getting coupon expired or course is not free after opening the link, then it is due to the fact that course instructors provide only few hundreds or thousands of slots which get exhausted. So, try to enroll in the course as soon as it is posted in the channel. The Coupons may expire any time for instant notification follow telegram channel

New customer offer! Top courses from $13.99 when you first visit Udemy

Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.

Description

OVERVIEW

 

Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.

 

Objective

 

In this course, you will learn:

 

Overview of Information and Cyber Security

 

Hacking and Ethical Hacking concepts

 

Five Phases of Hacking

 

Using tools for scanning and Vulnerability Assessment

 

Malware based Attacks

 

Man-in-the-Middle Attack

 

VAPT of Web Servers and Web Application Servers

 

Wireless Hacking

 

Target Audience

 

This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.

 

Prerequisites

 

For taking this course, knowledge about Networking Basics and Servers will be an essential.

 

Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.

 

Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

 

Module 1 : Introduction to Information Security

 

Information Security Overview

 

Hacking and Ethical Concepts

 

Hacking Phases

 

Information Security Controls

 

Penetration Testing Overview

 

Module 02 : Footprinting

 

Footprinting Concepts

 

Footprinting through Search Engines

 

Footprinting through Web Services

 

Footprinting through Social Networking Sites

 

Module 03: Scanning Networks

 

Understanding TCP Flags

 

Network Scanning Concepts

 

Scanning Techniques

 

Scanning Devices

 

Module 04: Enumeration

 

Enumeration Concepts

 

Enumeration Methods and Tools

 

Module 05: Vulnerability Assessment

 

Vulnerability Assessment Concepts

 

Vulnerability Assessment Solutions

 

Vulnerability Scoring Systems

 

Vulnerability Assessment Tools

 

Vulnerability Assessment Reports

 

Module 06: System Hacking

 

System Hacking Concepts

 

Cracking Passwords

 

Escalating Privileges

 

Executing Applications

 

Hiding Files

 

Covering Tracks

 

Module 07: Malware Threats

 

Malware Concepts

 

Trojan Concepts

 

Virus and Worm Concepts

 

Malware Analysis

 

Countermeasures

 

Anti-Malware Software

 

Module 08: Sniffing

 

Sniffing Concepts

 

Sniffing Technique: MAC Attacks

 

Sniffing Technique: DHCP Attacks

 

Sniffing Technique: ARP Poisoning

 

Sniffing Technique: Spoofing Attacks

 

Sniffing Technique: DNS Poisoning

 

Module 09: Web Servers/Application VAPT

 

Web Server/Application Assessment Methodology

 

Web Server/Application Assessment Tools

 

Web Server/Application VAPT and Reporting

 

Module 10: Wireless Network VAPT

 

Wi-Fi Authentication Modes

 

Wireless Encryption Protocols

 

Wireless Network VAPT and Reporting

Who this course is for:

This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.

Enroll Now