This plan includes
- Limitedfree coursesaccess
- Play & PauseCourse Videos
- VideoRecorded Lectures
- Learn onMobile/PC/Tablet
- Quizzes andReal Projects
- Lifetime CourseCertificate
- Email & ChatSupport
What you'll learn?
- Ethical Hacking and Penetration Testing
Course Overview
OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
-
Overview of Information and Cyber Security
-
Hacking and Ethical Hacking concepts
-
Five Phases of Hacking
-
Using tools for scanning and Vulnerability Assessment
-
Malware based Attacks
-
Man-in-the-Middle Attack
-
VAPT of Web Servers and Web Application Servers
-
Wireless Hacking
Target Audience
This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
Prerequisites
-
For taking this course, knowledge about Networking Basics and Servers will be an essential.
-
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
-
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Module 1 : Introduction to Information Security
-
Information Security Overview
-
Hacking and Ethical Concepts
-
Hacking Phases
-
Information Security Controls
-
Penetration Testing Overview
Module 02 : Footprinting
-
Footprinting Concepts
-
Footprinting through Search Engines
-
Footprinting through Web Services
-
Footprinting through Social Networking Sites
Module 03: Scanning Networks
-
Understanding TCP Flags
-
Network Scanning Concepts
-
Scanning Techniques
-
Scanning Devices
Module 04: Enumeration
-
Enumeration Concepts
-
Enumeration Methods and Tools
Module 05: Vulnerability Assessment
-
Vulnerability Assessment Concepts
-
Vulnerability Assessment Solutions
-
Vulnerability Scoring Systems
-
Vulnerability Assessment Tools
-
Vulnerability Assessment Reports
Module 06: System Hacking
-
System Hacking Concepts
-
Cracking Passwords
-
Escalating Privileges
-
Executing Applications
-
Hiding Files
-
Covering Tracks
Module 07: Malware Threats
-
Malware Concepts
-
Trojan Concepts
-
Virus and Worm Concepts
-
Malware Analysis
-
Countermeasures
-
Anti-Malware Software
Module 08: Sniffing
-
Sniffing Concepts
-
Sniffing Technique: MAC Attacks
-
Sniffing Technique: DHCP Attacks
-
Sniffing Technique: ARP Poisoning
-
Sniffing Technique: Spoofing Attacks
-
Sniffing Technique: DNS Poisoning
Module 09: Web Servers/Application VAPT
-
Web Server/Application Assessment Methodology
-
Web Server/Application Assessment Tools
-
Web Server/Application VAPT and Reporting
Module 10: Wireless Network VAPT
-
Wi-Fi Authentication Modes
-
Wireless Encryption Protocols
-
Wireless Network VAPT and Reporting
Pre-requisites
- Kali VM, Windows 10 VM and Windows Server VM
Target Audience
- Anyone who is willing to move into Information Security
Curriculum 37 Lectures 02:22:44
Section 1 : Introduction
- Lecture 2 :
- CIA
- Lecture 3 :
- Hacking Phases
- Lecture 4 :
- Bug Bounty Program
Section 2 : Reconnaissance
- Lecture 1 :
- Reconnaissance Introduction
- Lecture 2 :
- Footprinting
- Lecture 3 :
- Footprinting Demo
Section 3 : Scanning
- Lecture 1 :
- Scanning
- Lecture 2 :
- Network Discovery
- Lecture 3 :
- Port Scanning using NMAP
- Lecture 4 :
- Capturing and Analyzing Packets using Wireshark
- Lecture 5 :
- Understand TCP Flags
- Lecture 6 :
- Scanning beyond IDS and Firewall
- Lecture 7 :
- Idle Scan or Zombie Scan
Section 4 : Vulnerability Scanning
- Lecture 1 :
- Introduction to Vulnerability Scanning
- Lecture 2 :
- Vulnerability Scanning Demo
- Lecture 3 :
- Vulnerability Scanning Using Nessus
Section 5 : Gaining Access
- Lecture 1 :
- Gaining Access
- Lecture 2 :
- Privilege Escalation
- Lecture 3 :
- Gaining Access to windows 10 system
Section 6 : Maintaining Access
- Lecture 1 :
- Maintaining Access
- Lecture 2 :
- Clearing Tracks
Section 7 : Malware
- Lecture 1 :
- Malware
- Lecture 2 :
- Malware Demo
- Lecture 3 :
- Using Crypter to Keep Malware Undetected by Antivirus
Section 8 : Sniffing
- Lecture 1 :
- Sniffing
- Lecture 2 :
- MAC Flooding
- Lecture 3 :
- DHCP Attacks
- Lecture 4 :
- DNS Attacks
- Lecture 5 :
- ARP Poisoning
Section 9 : Web Server Attacks
- Lecture 1 :
- Web Server Attacks
- Lecture 2 :
- DDoS Attack
- Lecture 3 :
- Phishing Attack
- Lecture 4 :
- SSH Brute Force Attack
- Lecture 5 :
- Web Application Attack
Section 10 : Wireless Network Attack
- Lecture 1 :
- Understand Wireless Network Authentication and Encryption
- Lecture 2 :
- Wireless Network Attack
Our learners work at
Frequently Asked Questions
How do i access the course after purchase?
It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.Are these video based online self-learning courses?
Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.Can i play & pause the course as per my convenience?
Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.How do i contact the instructor for any doubts or questions?
Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.Do i need a pc to access the course or can i do it on mobile & tablet as well?
Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.Do i get any certificate for the courses?
Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.For how long can i access my course on the platform?
You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.Is there any free trial?
Currently, we do not offer any free trial.Can i cancel anytime?
Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?
Instructor
212730 Course Views
9 Courses