Diploma in Ethical Hacking

0
Certificate

Paid

Language

Level

Intermediate

Access

Free

Last updated on July 26, 2024 11:27 pm

Learn about the concept of ethical hacking in this course. Learn also about the concepts of cryptography, password cracking, malware, & vulnerability assessment

Add your review

This free online ethical hacking course can be of great help for people who have much interest in the field of networking and hacking ? ethically. The course gives insights into what it takes to be an ethical hacker, the roles of an ethical hacker, and network vulnerabilities. By the end of the course, you will be well equipped with the tools to use for network vulnerability assessment. Get started today and build your knowledge base.

What You Will Learn In This Free Course

  • Compare ethical hacking and penetrat…
  • Explain how network scan, port scan …
  • Explain how to use Metasploit for pe…
  • Explain the meaning of the term “Soc…
  • Compare ethical hacking and penetration testing
  • Explain how network scan, port scan and vulnerability scan work
  • Explain how to use Metasploit for penetration into Windows and Linux operating systems
  • Explain the meaning of the term “Social Engineering”
  • Describe man-in-the-middle attack using the concept of sniffing via ARP poisoning
  • Explain how the SHA-512 Compression function works
  • Outline the general defence guidelines against DoS and DDoS attack
  • Discuss some of the security issues in Domain Name System (DNS) server and email systems
  • Outline the meaning of plaintext, password hashing and password hash salting
  • Explain five password cracking techniques
  • Describe black box testing, physical probing, reverse engineering and side-channel analysis
  • Ethical Hacking and Basic Concepts of Networking

    In this module, you will be introduced to ethical hacking and basic concepts of networking. You will learn the roles of an ethical hacker and penetration testing methodologies. You will also learn about the layers of the OSI model and TCP/IP.

    IP Addressing and Routing

    In this module, you will learn about IP packet fragmentation, types of fragmentation, and IP addressing and routing You will also learn the roles of TCP, UDP and IP subnetting in the context of networking.; Module

    Routing Protocols

    In this module, you will majorly learn about routing protocols. You will get to learn about packet delivery options and routing methods. You will also learn about IP version 6 and some examples of how routing works in real-time.

    Nessus Installation

    In this module, you will see a practical demonstration of hacking using Kali Linux. You will also learn how to install and use a vulnerability scanner called Nessus.; Module

    Using Metasploit for Penetration Testing

    In this module, you will learn about how the Metasploit is used for penetration testing. You will also learn about Metasploit social engineering attack and man-in-the-middle attack in this module.; Module

    Diploma in Ethical Hacking – First Assessment

    You must score 80%or more to pass this assessment; Module

    Cryptography

    In this module, you will learn about the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work.; Module

    Cryptographic Hash Functions

    In this module, you will be introduced to cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures and digital certificates, secure socket layer and some common security protocols.

    Information Security

    In this module, you will learn about the importance of information security, including email security and DNS. You will learn about network-based attacks, biometrics and stenography.; Module

    Information Security Attacks

    This module expatiates on different kinds of attacks that can be done on a network, application or system. These include phishing, password cracking, wifi hacking, Dos and DDos attacks.; Module

    Hardware Security

    In this module, you will learn about the elements of hardware security and side-channel attacks. You will also learn about physical unclonable function and hardware Trojan.; Module

    Vulnerability Scanning

    In this module, you will learn about Vulnerability Scanning. You will also learn about file upload vulnerability, Cross-site scripting, SQL Injection and SQLMAP.; Module

    Network Analysis Tools

    In this module, you will be introduced to network analysis tools like Nmap and Wireshark You will see a live demonstration of how these two tools are used for network analysis and network vulnerability scanning.

    Diploma in Ethical Hacking – Second Assessment

    You must score 80% or more to pass this assessment; Module

    Course assessment

    User Reviews

    0.0 out of 5
    0
    0
    0
    0
    0
    Write a review

    There are no reviews yet.

    Be the first to review “Diploma in Ethical Hacking”

    ×

      Your Email (required)

      Report this page
      Diploma in Ethical Hacking
      Diploma in Ethical Hacking
      LiveTalent.org
      Logo
      Skip to content