Ethical Hacking and Penetration Testing | Udemy


Ethical Hacking and Penetration Testing | Udemy
English | Size: 3.11 GB
Genre: eLearning

What you’ll learn
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking

Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.

Objective

In this course, you will learn:

Overview of Information and Cyber Security

Hacking and Ethical Hacking concepts

Five Phases of Hacking

Using tools for scanning and Vulnerability Assessment

Malware based Attacks

Man-in-the-Middle Attack

VAPT of Web Servers and Web Application Servers

Wireless Hacking

Target Audience

This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.

Prerequisites

For taking this course, knowledge about Networking Basics and Servers will be an essential.

Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.

Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

Module 1 : Introduction to Information Security

Information Security Overview

Hacking and Ethical Concepts

Hacking Phases

Information Security Controls

Penetration Testing Overview

Module 02 : Footprinting

Footprinting Concepts

Footprinting through Search Engines

Footprinting through Web Services

Footprinting through Social Networking Sites

Module 03: Scanning Networks

Understanding TCP Flags

Network Scanning Concepts

Scanning Techniques

Scanning Devices

Module 04: Enumeration

Enumeration Concepts

Enumeration Methods and Tools

Module 05: Vulnerability Assessment

Vulnerability Assessment Concepts

Vulnerability Assessment Solutions

Vulnerability Scoring Systems

Vulnerability Assessment Tools

Vulnerability Assessment Reports

Module 06: System Hacking

System Hacking Concepts

Cracking Passwords

Escalating Privileges

Executing Applications

Hiding Files

Covering Tracks

Module 07: Malware Threats

Malware Concepts

Trojan Concepts

Virus and Worm Concepts

Malware Analysis

Countermeasures

Anti-Malware Software

Module 08: Sniffing

Sniffing Concepts

Sniffing Technique: MAC Attacks

Sniffing Technique: DHCP Attacks

Sniffing Technique: ARP Poisoning

Sniffing Technique: Spoofing Attacks

Sniffing Technique: DNS Poisoning

Module 09: Web Servers/Application VAPT

Web Server/Application Assessment Methodology

Web Server/Application Assessment Tools

Web Server/Application VAPT and Reporting

Module 10: Wireless Network VAPT

Wi-Fi Authentication Modes

Wireless Encryption Protocols

Wireless Network VAPT and Reporting

Who this course is for:
This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.

nitro.download/view/587770EE54D4649/Ethical-Hacking-and-Penetration-Testing.part01.rar
nitro.download/view/7B608C24C61B746/Ethical-Hacking-and-Penetration-Testing.part02.rar
nitro.download/view/E70D3AD772DE172/Ethical-Hacking-and-Penetration-Testing.part03.rar
nitro.download/view/1F8A864922E487E/Ethical-Hacking-and-Penetration-Testing.part04.rar
nitro.download/view/DB57132B0EAF5F2/Ethical-Hacking-and-Penetration-Testing.part05.rar
nitro.download/view/712FAB2C9C4FAC7/Ethical-Hacking-and-Penetration-Testing.part06.rar
nitro.download/view/1F88C6CE7C522EA/Ethical-Hacking-and-Penetration-Testing.part07.rar

rapidgator.net/file/87ffa37c17ae13c41c839ce8e1c6f672/Ethical-Hacking-and-Penetration-Testing.part01.rar.html
rapidgator.net/file/ecb9993bb4973e21549beb21c172cfa9/Ethical-Hacking-and-Penetration-Testing.part02.rar.html
rapidgator.net/file/533f82f5e87deb1be511f52876fc4b85/Ethical-Hacking-and-Penetration-Testing.part03.rar.html
rapidgator.net/file/1a8123fd2a6cf87ce95924356a0eb4c8/Ethical-Hacking-and-Penetration-Testing.part04.rar.html
rapidgator.net/file/4da5c3fccfe037176789515af5fffbac/Ethical-Hacking-and-Penetration-Testing.part05.rar.html
rapidgator.net/file/78784ee9be75cd5d96447d9de2ec61ec/Ethical-Hacking-and-Penetration-Testing.part06.rar.html
rapidgator.net/file/c19920dadef49224dbc12bd9c6588da5/Ethical-Hacking-and-Penetration-Testing.part07.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.