Diploma in Ethical Hacking
Learn about the concept of ethical hacking in this course. Learn also about the concepts of cryptography, password cracking, malware, & vulnerability assessment
This free online ethical hacking course can be of great help for people who have much interest in the field of networking and hacking ? ethically. The course gives insights into what it takes to be an ethical hacker, the roles of an ethical hacker, and network vulnerabilities. By the end of the course, you will be well equipped with the tools to use for network vulnerability assessment. Get started today and build your knowledge base.
What You Will Learn In This Free Course
Ethical Hacking and Basic Concepts of Networking
In this module, you will be introduced to ethical hacking and basic concepts of networking. You will learn the roles of an ethical hacker and penetration testing methodologies. You will also learn about the layers of the OSI model and TCP/IP.
IP Addressing and Routing
In this module, you will learn about IP packet fragmentation, types of fragmentation, and IP addressing and routing You will also learn the roles of TCP, UDP and IP subnetting in the context of networking.; Module
In this module, you will majorly learn about routing protocols. You will get to learn about packet delivery options and routing methods. You will also learn about IP version 6 and some examples of how routing works in real-time.
In this module, you will see a practical demonstration of hacking using Kali Linux. You will also learn how to install and use a vulnerability scanner called Nessus.; Module
Using Metasploit for Penetration Testing
In this module, you will learn about how the Metasploit is used for penetration testing. You will also learn about Metasploit social engineering attack and man-in-the-middle attack in this module.; Module
Diploma in Ethical Hacking – First Assessment
You must score 80%or more to pass this assessment; Module
In this module, you will learn about the concept of Cryptography. You will learn about private-key cryptography, public-key cryptography and the principles behind how they work.; Module
Cryptographic Hash Functions
In this module, you will be introduced to cryptographic hash functions. You will learn about the basic properties of hash functions, requirements of hash functions and popular hash functions. Furthermore, you will learn the importance of digital signatures and digital certificates, secure socket layer and some common security protocols.
In this module, you will learn about the importance of information security, including email security and DNS. You will learn about network-based attacks, biometrics and stenography.; Module
Information Security Attacks
This module expatiates on different kinds of attacks that can be done on a network, application or system. These include phishing, password cracking, wifi hacking, Dos and DDos attacks.; Module
In this module, you will learn about the elements of hardware security and side-channel attacks. You will also learn about physical unclonable function and hardware Trojan.; Module
In this module, you will learn about Vulnerability Scanning. You will also learn about file upload vulnerability, Cross-site scripting, SQL Injection and SQLMAP.; Module
Network Analysis Tools
In this module, you will be introduced to network analysis tools like Nmap and Wireshark You will see a live demonstration of how these two tools are used for network analysis and network vulnerability scanning.
Diploma in Ethical Hacking – Second Assessment
You must score 80% or more to pass this assessment; Module