Left Blocks Image | Learnfly Right Blocks Image | Learnfly
All in One Offer! | Access Unlimited Courses in any category starting at just $29. Offer Ends in:

Learnfly | Menu Trigger Icons Browse Library

  • Business Solutions
  • Become an Instructor
  • 0
    Shopping Cart
    Learnfly | Empty Cart Icons

    Your Cart is empty. Keep shopping to find a course!

    Browse Courses
Free
8 days left at this price!

This plan includes

  • Limitedfree coursesaccess
  • Play & PauseCourse Videos
  • VideoRecorded Lectures
  • Learn onMobile/PC/Tablet
  • Quizzes andReal Projects
  • Lifetime CourseCertificate
  • Email & ChatSupport
Get Unlimited Learning Access
$29
8 days left at this price!
30-Day Money-Back Guarantee

This plan includes

  • Access to11,000+Courses
  • Adsfree experienceCourses
  • Play & PauseCourse Videos
  • Learnfly HD IconsHD VideoRecorded Lectures
  • Learn onMobile/PC/Tablet
  • Quizzes andReal Projects
  • Lifetime CourseCertificate
  • InstructorDirect Support
  • Email & ChatSupport
  • Cancel Anytime
$29
$29
$29
  • Ethical Hacking and Penetration Testing

OVERVIEW

Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.

Objective

In this course, you will learn:

  • Overview of Information and Cyber Security

  • Hacking and Ethical Hacking concepts

  • Five Phases of Hacking

  • Using tools for scanning and Vulnerability Assessment

  • Malware based Attacks

  • Man-in-the-Middle Attack

  • VAPT of Web Servers and Web Application Servers

  • Wireless Hacking

Target Audience

This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.

Prerequisites

  • For taking this course, knowledge about Networking Basics and Servers will be an essential.

  • Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.

  • Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

Module 1 : Introduction to Information Security

  • Information Security Overview

  • Hacking and Ethical Concepts

  • Hacking Phases

  • Information Security Controls

  • Penetration Testing Overview

Module 02 : Footprinting

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

Module 03: Scanning Networks 

  • Understanding TCP Flags

  • Network Scanning Concepts

  • Scanning Techniques

  • Scanning Devices

Module 04: Enumeration

  • Enumeration Concepts

  • Enumeration Methods and Tools

Module 05: Vulnerability Assessment

  • Vulnerability Assessment Concepts

  • Vulnerability Assessment Solutions

  • Vulnerability Scoring Systems

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

Module 06: System Hacking

  • System Hacking Concepts

  • Cracking Passwords

  • Escalating Privileges

  • Executing Applications

  • Hiding Files

  • Covering Tracks

Module 07: Malware Threats

  • Malware Concepts

  • Trojan Concepts

  • Virus and Worm Concepts

  • Malware Analysis

  • Countermeasures

  • Anti-Malware Software

Module 08: Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

Module 09: Web Servers/Application VAPT

  • Web Server/Application Assessment Methodology

  • Web Server/Application Assessment Tools

  • Web Server/Application VAPT and Reporting

Module 10: Wireless Network VAPT

  • Wi-Fi Authentication Modes

  • Wireless Encryption Protocols

  • Wireless Network VAPT and Reporting

  • Kali VM, Windows 10 VM and Windows Server VM
  • Anyone who is willing to move into Information Security
View More...
  • Section 1 : Introduction 4 Lectures 00:11:56

    • Lecture 1 :
    • Introduction to Ethical Hacking Preview
    • Lecture 2 :
    • CIA
    • Lecture 3 :
    • Hacking Phases
    • Lecture 4 :
    • Bug Bounty Program
  • Section 2 : Reconnaissance 3 Lectures 00:05:54

    • Lecture 1 :
    • Reconnaissance Introduction
    • Lecture 2 :
    • Footprinting
    • Lecture 3 :
    • Footprinting Demo
  • Section 3 : Scanning 7 Lectures 00:16:21

    • Lecture 1 :
    • Scanning
    • Lecture 2 :
    • Network Discovery
    • Lecture 3 :
    • Port Scanning using NMAP
    • Lecture 4 :
    • Capturing and Analyzing Packets using Wireshark
    • Lecture 5 :
    • Understand TCP Flags
    • Lecture 6 :
    • Scanning beyond IDS and Firewall
    • Lecture 7 :
    • Idle Scan or Zombie Scan
  • Section 4 : Vulnerability Scanning 3 Lectures 00:16:35

    • Lecture 1 :
    • Introduction to Vulnerability Scanning
    • Lecture 2 :
    • Vulnerability Scanning Demo
    • Lecture 3 :
    • Vulnerability Scanning Using Nessus
  • Section 5 : Gaining Access 3 Lectures 00:20:51

    • Lecture 1 :
    • Gaining Access
    • Lecture 2 :
    • Privilege Escalation
    • Lecture 3 :
    • Gaining Access to windows 10 system
  • Section 6 : Maintaining Access 2 Lectures 00:00:00

    • Lecture 1 :
    • Maintaining Access
    • Lecture 2 :
    • Clearing Tracks
  • Section 7 : Malware 3 Lectures 00:13:06

    • Lecture 1 :
    • Malware
    • Lecture 2 :
    • Malware Demo
    • Lecture 3 :
    • Using Crypter to Keep Malware Undetected by Antivirus
  • Section 8 : Sniffing 5 Lectures 00:18:32

    • Lecture 1 :
    • Sniffing
    • Lecture 2 :
    • MAC Flooding
    • Lecture 3 :
    • DHCP Attacks
    • Lecture 4 :
    • DNS Attacks
    • Lecture 5 :
    • ARP Poisoning
  • Section 9 : Web Server Attacks 5 Lectures 00:27:50

    • Lecture 1 :
    • Web Server Attacks
    • Lecture 2 :
    • DDoS Attack
    • Lecture 3 :
    • Phishing Attack
    • Lecture 4 :
    • SSH Brute Force Attack
    • Lecture 5 :
    • Web Application Attack
  • Section 10 : Wireless Network Attack 2 Lectures 00:11:39

    • Lecture 1 :
    • Understand Wireless Network Authentication and Encryption
    • Lecture 2 :
    • Wireless Network Attack
  • Learnfly Google Logo
  • Learnfly Facebook Logo
  • Learnfly Apple Logo
  • Learnfly EA Logo
  • Learnfly Amazon Logo
  • Learnfly IBM Logo
  • Learnfly Microsoft Logo
  • Learnfly Reddit Logo
  • Learnfly Spotify Logo
  • Learnfly Uber Logo
  • Learnfly Youtube Logo
  • Learnfly Instagram Logo
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
    Learnfly LMS Sample
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
User Images | Learnfly

212936 Course Views

9 Courses

A technocrat with over 21 Years of total experience in INFRASTRUCTURE MANAGEMENT SERVICE with technical expertise in Implementation, Datacenter Operations, Cloud Infrastructure, Cyber Security, Support and Training on most of the industry-standard latest technologies. Certified Ethical Hacker ( CEH ) Computer Hacker Forensic Investigator ( CHFI ) Certified EC-Council Instructor ( CEI ) Citrix Certified Associate ( CCA ) Microsoft Certified System Administrator ( MCSA ) IBM Certified AIX Administrato
View More...
  • Unmatched Variety and Value!
    Learnfly's monthly subscription offers unlimited access to a vast range of courses. Affordable pricing, compared to competitors, makes it the ultimate choice for continuous learning.
    Jessica M.

    4.7

    JM
  • Top-Notch Quality, Affordable Rates!
    High-quality courses with certified instructors make Learnfly stand out. The affordable pricing is a game-changer for those seeking premium education.
    Alex P.

    4.5

    AP
  • Certified Excellence Every Time!
    Learnfly's courses, taught by certified instructors, ensure top-notch learning experiences. The course completion certificates add significant value to one's skill set.
    Sarah R.

    4.3

    SR
  • Round-the-Clock Support!
    Learnfly goes the extra mile with 24/7 course support. Their dedication to helping students succeed is commendable.
    Ryan K.

    4.1

    RK
  • Learn Anywhere, Anytime!
    Whether on mobile, PC, or tablet, Learnfly's platform offers flexibility. Learning on the go has never been easier.
    Emily S.

    4.7

    ES
  • Job-Ready Skills!
    Learnfly's job-oriented courses equip learners with practical skills for the workplace. An investment in career growth!
    Jake M.

    4.2

    JM
  • Budget-Friendly Brilliance!
    Learnfly's pricing is a steal for the quality and variety of courses offered. Quality education without breaking the bank.
    Olivia T.

    4.5

    OT
  • Instructor Excellence Unleashed!
    Learn from the best with Learnfly's certified instructors. The platform ensures that knowledge is imparted by industry experts.
    Daniel L.

    4.0

    DL
  • Achievement Unlocked!
    Learnfly not only offers courses but also recognizes your efforts with course completion certificates. A sense of accomplishment with every course finished.
    Maya H.

    4.6

    MH
  • Learning Revolution!
    Learnfly's platform is a revolution in education. Access to unlimited courses at affordable rates is a game-changer.
    Ethan W.

    4.7

    EW
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lectures 80 Beginner 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lectures 17 Beginner 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lectures 6 Beginner 0:10:40
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lectures 40 Beginner 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lectures 30 Beginner 3:28:56
  • the-complete-xmpp-course-chat-server-setup-android-ios-apps

    The Complete XMPP Course: Chat Serv...

    By : Abhilash Nelson

    Lectures 10 Beginner 0:47:3

Students learning on Learnfly works with Fortune 500 companies around the globe.

  • Learnfly | a-l-1a Icons
  • Learnfly | a-l-2a Icons
  • Learnfly | a-l-3a Icons
  • Learnfly | a-l-4a Icons
  • Learnfly | a-l-6a Icons
  • Learnfly | a-l-7a Icons
Sign Up & Start Learning
Learnfly | Sign Up Icons
Learnfly | Sign Up Icons
Learnfly | Sign Up Icons
By signing up, you agree to our Terms of Use and Privacy Policy
Reset Password
Enter your email address and we'll send you a link to reset your password.
Learnfly | Sign Up Icons