Ethical Hacking and Penetration Testing

"softddl.org"
31-07-2021, 06:31
Rating:
0
0 vote


  • Ethical Hacking and Penetration Testing
    Duration: 6h41m | Video: .MP4, 1280x720 30 fps | Audio: AAC, 44.1 kHz, 2ch | Size: 3.1 GB | Last Update: 7/2021
    Genre: eLearning | Language: English
    Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.



Ethical Hacking and Penetration Testing
Duration: 6h41m | Video: .MP4, 1280x720 30 fps | Audio: AAC, 44.1 kHz, 2ch | Size: 3.1 GB | Last Update: 7/2021
Genre: eLearning | Language: English
Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.


What you'll learn:
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Requirements:
For taking this course, knowledge about Networking Basics and Servers will be an essential.
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Description:
OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Target Audience
This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
Prerequisites
For taking this course, knowledge about Networking Basics and Servers will be an essential.
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Module 1 : Introduction to Information Security
Information Security Overview
Hacking and Ethical Concepts
Hacking Phases
Information Security Controls
Penetration Testing Overview
Module 02 : Footprinting
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Module 03: Scanning Networks
Understanding TCP Flags
Network Scanning Concepts
Scanning Techniques
Scanning Devices
Module 04: Enumeration
Enumeration Concepts
Enumeration Methods and Tools
Module 05: Vulnerability Assessment
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Module 07: Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Module 08: Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Module 09: Web Servers/Application VAPT
Web Server/Application Assessment Methodology
Web Server/Application Assessment Tools
Web Server/Application VAPT and Reporting
Module 10: Wireless Network VAPT
Wi-Fi Authentication Modes
Wireless Encryption Protocols
Wireless Network VAPT and Reporting
Who this course is for:
This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
Homepage
https://www.udemy.com/course/ethical-hacking-and-penetration-testing-x/


Buy Premium From My Links To Get Resumable Support,Max Speed & Support Me


Links are Interchangeable - No Password - Single Extraction
 
Comments
The minimum comment length is 50 characters. comments are moderated
There are no comments yet. You can be the first!
Download free » Tutorials » Ethical Hacking and Penetration Testing
Copyright holders