Ethical Hacking and Penetration Testing Course
Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.
Ethical Hacking,Penetration Testing,IT & Software
Lectures -37
Duration -6.5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Goals
What will you learn in this course:
- Overview of Information and Cyber Security
- Hacking and Ethical Hacking concepts
- Five Phases of Hacking
- Using tools for scanning and Vulnerability Assessment
- Malware based Attacks
- Man-in-the-Middle Attack
- VAPT of Web Servers and Web Application Servers
- Wireless Hacking
Prerequisites
What are the prerequisites for this course?
- For taking this course, knowledge about Networking Basics and Servers will be an essential.
- Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
- Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to Information Security
4 Lectures
- Introduction to Ethical Hacking 14:44 14:44
- CIA 11:56 11:56
- Hacking Phases 05:11 05:11
- Bug Bounty Program 10:44 10:44
Reconnaissance
3 Lectures
Scanning Networks
7 Lectures
Vulnerability Scanning
3 Lectures
Gaining Access
3 Lectures
Maintaining Access
2 Lectures
Malware
3 Lectures
Sniffing
5 Lectures
Web Server Attacks
5 Lectures
Wireless Network Attack
2 Lectures
Instructor Details
ILANCHEZHIAN K
eCourse Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now