Equip yourself with expertise to conduct penetration tests, identify vulnerabilities and implement corrective measures to enhance information security.
188
views
Last updated
2/2024
English
Or
* Please use the WELCOME-20 Discount Codeto enjoy 20% Off
Get your team access to top Uplyrn courses anytime,
anywhere.
Overview
The course on Ethical Hacking and Penetration Testing equips participants with the necessary expertise to become a proficient Security Professional. It imparts knowledge crucial for conducting penetration tests, identifying vulnerabilities, and implementing corrective measures to lessen the likelihood of attacks. Throughout the course, participants will engage with advanced tools in practical scenarios to pinpoint, observe, and exploit any discovered weaknesses within a targeted network environment. A distinctive feature of this course is its emphasis on hands-on demonstrations, which complement the theoretical knowledge imparted.
Fundamentals of Information Security
Overview of Information Security
Understanding Ethical Hacking and Its Principles
Stages of Hacking
Measures for Information Security
Basics of Penetration Testing
Exploring Digital Footprints
Basics of Footprinting
Utilizing Search Engines for Footprinting
Leveraging Web Services for Footprinting
Footprinting via Social Media Platforms
Network Scanning
Exploring TCP Flags
Fundamentals of Network Scanning
Various Scanning Approaches
Devices Used in Scanning
Techniques of Enumeration
Basics of Enumeration
Enumeration Strategies and Instruments
Conducting Vulnerability Assessments
Principles of Vulnerability Assessment
Solutions for Vulnerability Assessment
Systems for Rating Vulnerabilities
Instruments for Vulnerability Assessment
Compiling Vulnerability Assessment Reports
Penetrating Systems
Concepts in System Penetration
Techniques for Password Cracking
Privilege Elevation Methods
Application Execution
File Concealment
Erasing Evidence
Understanding Malware Threats
Introduction to Malware
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis and Countermeasures
Anti-Malware Software
Exploring Sniffing Techniques
Understanding Sniffing
Sniffing Concepts
Various Sniffing Techniques
MAC Attacks
DHCP Attacks
ARP Poisoning
Spoofing Attacks
DNS Poisoning
Web Servers and Application Vulnerability Assessment and Penetration Testing (VAPT)
Web Server and Application Assessment
Assessment Methodology
Assessment Tools
VAPT and Reporting
Wireless Network Vulnerability Assessment and Penetration Testing (VAPT)
Wireless Network Security
Wi-Fi Authentication Modes
Wireless Encryption Protocols
VAPT for Wireless Networks
VAPT Process
Reporting and Analysis
Who this course is for
This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
Testimonials
Great course! 5 stars. Very interestingly structured and presented comprehensibly. All topics are really explained in great detail, by explaining the material step-by-step, the content remains in the head. Thank you ILANCHEZHIAN K for this great and unforgettable opportunity. I am really enthusiastic and can only recommend this course for those interested ~ Waldemar S
The instructor make it so simple, i love it. :) ~ Abdalrhman H
This a very very awesome course. It is very simple to understand and based on 95% practical explanation ~ M Sunil
What you'll learn
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Requirements
For taking this course, knowledge about Networking Basics and Servers will be an essential.
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Overview
The course on Ethical Hacking and Penetration Testing equips participants with the necessary expertise to become a proficient Security Professional. It imparts knowledge crucial for conducting penetration tests, identifying vulnerabilities, and implementing corrective measures to lessen the likelihood of attacks. Throughout the course, participants will engage with advanced tools in practical scenarios to pinpoint, observe, and exploit any discovered weaknesses within a targeted network environment. A distinctive feature of this course is its emphasis on hands-on demonstrations, which complement the theoretical knowledge imparted.
Fundamentals of Information Security
Exploring Digital Footprints
Network Scanning
Techniques of Enumeration
Conducting Vulnerability Assessments
Penetrating Systems
Understanding Malware Threats
Exploring Sniffing Techniques
Understanding Sniffing
Various Sniffing Techniques
Web Servers and Application Vulnerability Assessment and Penetration Testing (VAPT)
Wireless Network Vulnerability Assessment and Penetration Testing (VAPT)
Wireless Network Security
VAPT for Wireless Networks
Who this course is for
This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.
Testimonials
What you'll learn
Requirements
Course Content
10 Sections 37 Lectures 6h 42m total length
All Comments