HOME > IT & Software > Ethical Hacking and Penetration Testing

Ethical Hacking and Penetration Testing

SynopsisEthical Hacking and Penetration Testing, available at $69.99,...
Ethical Hacking and Penetration Testing  No.1

Ethical Hacking and Penetration Testing, available at $69.99, has an average rating of 4.6, with 37 lectures, based on 145 reviews, and has 18541 subscribers.

You will learn about In this course, you will learn: Overview of Information and Cyber Security Hacking and Ethical Hacking concepts Five Phases of Hacking Using tools for scanning and Vulnerability Assessment Malware based Attacks Man-in-the-Middle Attack VAPT of Web Servers and Web Application Servers Wireless Hacking This course is ideal for individuals who are This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals. It is particularly useful for This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.

Enroll now: Ethical Hacking and Penetration Testing

Summary

Title: Ethical Hacking and Penetration Testing

Price: $69.99

Average Rating: 4.6

Number of Lectures: 37

Number of Published Lectures: 37

Number of Curriculum Items: 37

Number of Published Curriculum Objects: 37

Original Price: ?2,499

Quality Status: approved

Status: Live

What You Will Learn

  • In this course, you will learn:
  • Overview of Information and Cyber Security
  • Hacking and Ethical Hacking concepts
  • Five Phases of Hacking
  • Using tools for scanning and Vulnerability Assessment
  • Malware based Attacks
  • Man-in-the-Middle Attack
  • VAPT of Web Servers and Web Application Servers
  • Wireless Hacking
  • Who Should Attend

  • This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
  • Target Audiences

  • This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
  • OVERVIEW

    Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.

    Objective

    In this course, you will learn:

  • Overview of Information and Cyber Security

  • Hacking and Ethical Hacking concepts

  • Five Phases of Hacking

  • Using tools for scanning and Vulnerability Assessment

  • Malware based Attacks

  • Man-in-the-Middle Attack

  • VAPT of Web Servers and Web Application Servers

  • Wireless Hacking

  • Target Audience

    This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.

    Prerequisites

  • For taking this course, knowledge about Networking Basics and Servers will be an essential.

  • Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.

  • Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

  • Module 1 : Introduction to Information Security 

  • Information Security Overview

  • Hacking and Ethical Concepts

  • Hacking Phases

  • Information Security Controls

  • Penetration Testing Overview

  • Module 02 : Footprinting 

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

  • Module 03: Scanning Networks 

  • Understanding TCP Flags

  • Network Scanning Concepts

  • Scanning Techniques

  • Scanning Devices

  • Module 04: Enumeration

  • Enumeration Concepts

  • Enumeration Methods and Tools

  • Module 05: Vulnerability Assessment

  • Vulnerability Assessment Concepts

  • Vulnerability Assessment Solutions

  • Vulnerability Scoring Systems

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

  • Module 06: System Hacking

  • System Hacking Concepts

  • Cracking Passwords

  • Escalating Privileges

  • Executing Applications

  • Hiding Files

  • Covering Tracks

  • Module 07: Malware Threats

  • Malware Concepts

  • Trojan Concepts

  • Virus and Worm Concepts

  • Malware Analysis

  • Countermeasures

  • Anti-Malware Software

  • Module 08: Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

  • Module 09: Web Servers/Application VAPT

  • Web Server/Application Assessment Methodology

  • Web Server/Application Assessment Tools

  • Web Server/Application VAPT and Reporting

  • Module 10: Wireless Network VAPT

  • Wi-Fi Authentication Modes

  • Wireless Encryption Protocols

  • Wireless Network VAPT and Reporting

  • Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction to Ethical Hacking

    Lecture 2: CIA

    Lecture 3: Hacking Phases

    Lecture 4: Bug Bounty Program

    Chapter 2: Reconnaissance

    Lecture 1: Reconnaissance Introduction

    Lecture 2: Footprinting

    Lecture 3: Footprinting Demo

    Chapter 3: Scanning

    Lecture 1: Scanning

    Lecture 2: Network Discovery

    Lecture 3: Port Scanning using NMAP

    Lecture 4: Capturing and Analyzing Packets using Wireshark

    Lecture 5: Understand TCP Flags

    Lecture 6: Scanning beyond IDS and Firewall

    Lecture 7: Idle Scan or Zombie Scan

    Chapter 4: Vulnerability Scanning

    Lecture 1: Introduction to Vulnerability Scanning

    Lecture 2: Vulnerability Scanning Demo

    Lecture 3: Vulnerability Scanning Using Nessus

    Chapter 5: Gaining Access

    Lecture 1: Gaining Access

    Lecture 2: Gaining Access to Windows 10 System

    Lecture 3: Privilege Escalation

    Chapter 6: Maintaining Access

    Lecture 1: Maintaining Access

    Lecture 2: Clearing Tracks

    Chapter 7: Malware

    Lecture 1: Malware

    Lecture 2: Malware Demo

    Lecture 3: Using Crypter to Keep Malware Undetected by Antivirus

    Chapter 8: Sniffing

    Lecture 1: Sniffing

    Lecture 2: MAC Flooding

    Lecture 3: DHCP Attacks

    Lecture 4: DNS Attacks

    Lecture 5: ARP Poisoning

    Chapter 9: Web Server Attacks

    Lecture 1: Web Server Attacks

    Lecture 2: DDoS Attack

    Lecture 3: Phishing Attack

    Lecture 4: SSH Brute Force Attack

    Lecture 5: Web Application Attack

    Chapter 10: Wireless Network Attack

    Lecture 1: Understand Wireless Network Authentication and Encryption

    Lecture 2: Wireless Network Attack

    Instructors

  • Ethical Hacking and Penetration Testing  No.2
    ILANCHEZHIAN. K 1,08,944 Students
    Sr. Technical Consultant – COMET
  • Rating Distribution

  • 1 stars: 3 votes
  • 2 stars: 4 votes
  • 3 stars: 13 votes
  • 4 stars: 44 votes
  • 5 stars: 81 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!