Ethical Hacking and Penetration Testing Course
Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.
IT and Software ,Network and Security,Ethical Hacking
Lectures -37
Duration -6.5 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
Course Overview:
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can help one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions to mitigate the risk of attack. In this course, we will also discuss the scenarios with a few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Course Objective:
In this course, you will learn:
Overview of Information and Cyber Security.
Hacking and Ethical Hacking Concepts.
Five Phases of Hacking.
Using tools for scanning and Vulnerability Assessment.
Malware-based Attacks.
Man-in-the-Middle Attack.
VAPT of Web Servers and Web Application Servers.
Wireless Hacking.
Goals
- Overview of Information and Cyber Security.
- Hacking and Ethical Hacking Concepts.
- Five Phases of Hacking.
- Using tools for scanning and Vulnerability Assessment.
- Malware-based Attacks.
- Man-in-the-Middle Attack.
- VAPT of Web Servers and Web Application Servers.
- Wireless Hacking.
Prerequisites
- For taking this course, knowledge about Networking Basics and Servers will be essential.
- Good knowledge of TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
- Good Knowledge of Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to Information Security
4 Lectures
- Introduction to Ethical Hacking 14:44 14:44
- CIA 11:56 11:56
- Hacking Phases 05:11 05:11
- Bug Bounty Program 10:44 10:44
Reconnaissance
3 Lectures
Scanning Networks
7 Lectures
Vulnerability Scanning
3 Lectures
Gaining Access
3 Lectures
Maintaining Access
2 Lectures
Malware
3 Lectures
Sniffing
5 Lectures
Web Server Attacks
5 Lectures
Wireless Network Attack
2 Lectures
Instructor Details
ILANCHEZHIAN K
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now