The purpose of this course is to introduce students to the intriguing and interesting world of ethical hacking. With the ever...
Mode Of Delivery
Module 1: Introduction to Ethical Hacking
Hacking Methodology, Process of Malicious Hacking, Footprinting and Scanning: Footprinting, Scanning. Enumeration: Enumeration. System Hacking and Trojans: System Hacking, Trojans and Black Box Vs White Box Techniques.
Module 2: Hacking Methodology
Denial of Service, Sniffers, Session Hijacking and Hacking Web Servers: Session Hijacking, Hacking Web Servers. Web Application Vulnerabilities and Web Techniques Based Password Cracking: Web Application Vulnerabilities, Web Based Password Cracking Techniques.
Module 3: Web And Network Hacking
SQL Injection, Hacking Wireless Networking, Viruses, Worms and Physical Security: Viruses and Worms, Physical Security. Linux Hacking: Linux Hacking. Evading IDS and Firewalls: Evading IDS and Firewalls.
Module 4: Report Writing and Mitigation
Introduction to Report Writing & Mitigation, requirements for low level reporting & high level reporting of Penetration testing results, Demonstration of vulnerabilities and Mitigation of issues identified including tracking.
Who Should Attend?
After completing this course and successfully passing the certification examination, the student will be awarded the “Ethical Hacking” certification.
If a learner chooses not to take up the examination, they will still get a 'Participation Certificate'.