th (2)

Ethical Hacking for Beginners

Twenty 19
Compare

In this course you will learn about the best known tools and technologies which Professional Ethical Hackers use. You will learn about Kali Linux, Penetration Testing, Google Hacking, Port Scanning, attacks and exploitation, Vulnerability Assessment, Web Hacking, ARP Poisoning and much more. No prior experience of Ethical Hacking is required to learn this course!

 

  • Fee Details : 3499
  • PROVIDER : Twenty 19

₹ 3,499.00

  • Talk to an expert counsellor for free!











Product Description

Ethical Hacking – had always been a career sought after by many. It is glamorous and it pays well! Learn about the best known tools and technologies which Professional Ethical Hackers are using in the industry. Learn about the resources and pointers to become excellent Ethical Hacker.

  1. Chapter 1

    • 1.1 – Introduction to Ethical Hacking
    • 1.2 – Introduction to Kali Linux
    • 1.3 – Playing with Kali Linux
    • 1.4 – Guidelines
    • 1.5 – Next Steps
    • Quiz 1
  2. Chapter 2

    • 2- Basics of networking
    • Quiz 2
  3. Chapter 3

    • 3- Penetration Testing Introduction
    • Quiz 3
  4. Chapter 4

    • 4.1 – Information Gathering: Google Hacking
    • 4.2 – Information Gathering: Whois
    • 4.3 – Information Gathering: DNS Enumeration
    • 4.4 – Information Gathering: Other Tools
    • 4.5 – Information Gathering: Next Steps
    • Quiz 4
  5. Chapter 5

    • 5.1 – Scanning & Footprinting: Setting Up the target
    • 5.2 – Scanning & Footprinting: Port Scanning basics
    • 5.3 – Scanning & Footprinting: Port Scanning using NMAP
    • 5.4 -Scanning & Footprinting: Enumeration using NMAP
  6. Chapter 6

    • 6.1 – Attack & Exploitation: Exploitation Introduction and Metasploit
    • 6.2 – Attack & Exploitation: Bruteforce Attack
    • 6.3 – Attack & Exploitation: War File upload Exploit
    • 6.4 – Attack & Exploitation: Other Attack
  7. Chapter 7

    • 7.1 – Vunerability Assessment Introduction
    • 7.2 – Vunerability Assessment: Nessus Tool
    • 7.3 – Vunerability Assessment: Next Steps
  8. Chapter 8

    • 8.1 – Web Hacking: Basics of Web Application
    • 8.2 – Web Hacking: SQL injection
    • 8.3 – Web Hacking: Cross Site Scripting
    • 8.4 – Web Hacking: Next Steps
  9. Chapter 9

    • 9.1 – ARP Poisoning Introduction
    • 9.2 – ARP Poisoning Attack
  10. Chapter 10

    • 10- Project: Metasploitable 1

Reviews

There are no reviews yet.

Be the first to review “Ethical Hacking for Beginners”