Certified Ethical Hacking by Saif Khan

Description

Ethical Hacking is an accepted method of circumventing device security in order to detect possible data breaches and vulnerabilities within a network. The organization that operates the system or network encourages Cyber Security experts to carry out these exercises to test the system's defenses

To help identify potential threats on a computer or network, ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual. An ethical hacker attempts to circumvent network protection and search for any weak points that malicious hackers might exploit.

Ethical hacking is intended to assess the security and identify vulnerabilities in systems, networks, or system infrastructure. It includes finding and attempting to exploit any vulnerabilities to determine if unauthorized access is possible or other malicious activities.

Training Outcome
  • Course Complete Certificate


Requirements
  • Bachelors degree in Computer Technology

Lessons

  • 48 Lessons
  • 48:00:00 Hours
  • Introduction to Ethical Hacking01:00:00
  • Network & Scanning the networks : 101:00:00
  • Network & Scanning the networks : 201:00:00
  • Phishing Attacks & Defense01:00:00
  • Malwares01:00:00
  • Viruses 01:00:00
  • System Hacking01:00:00
  • Social Engineering Attacks & Defense : 101:00:00
  • Social Engineering Attacks & Defense : 201:00:00
  • Foot Printing 01:00:00
  • Reconnaissance01:00:00
  • Enumeration01:00:00
  • Trojans01:00:00
  • Backdoors01:00:00
  • Sniffing Attacks & Defense 01:00:00
  • Spoofing Attacks & Defense01:00:00
  • Denial of Service01:00:00
  • Session Hijacking01:00:00
  • Hacking & Securing web applications : 101:00:00
  • Hacking & Securing web applications : 201:00:00
  • Hacking Wireless Networks01:00:00
  • Wireless Penetration Testing01:00:00
  • Evading IDS & Firewalls01:00:00
  • Cryptography01:00:00
  • SSL Stripping01:00:00
  • Bypassing Firewalls01:00:00
  • VPN’s Configuration & Troubleshooting : 101:00:00
  • VPN’s Configuration & Troubleshooting : 201:00:00
  • Customizing windows 01:00:00
  • Protecting from External Attacks01:00:00
  • Android/iPhone Attack & Defense01:00:00
  • Hijacking Webserver’s01:00:00
  • SQL Injection01:00:00
  • Vulnerablity Analysis01:00:00
  • Injecting Malicious Packet01:00:00
  • Penetration Testing01:00:00
  • Windows & Linux 01:00:00
  • Attack & Defense01:00:00
  • Hide Yourself01:00:00
  • Track Anyone01:00:00
  • Cloud Computing01:00:00
  • Cloud Security01:00:00
  • CCTV Security 01:00:00
  • Hacking01:00:00
  • Kali-Linux Installation, Usage & Troubleshooting : 101:00:00
  • Kali-Linux Installation, Usage & Troubleshooting : 201:00:00
  • Github usage on Kali-linux01:00:00
  • Assignment01:00:00

About instructor

Instructor
Name : Course Monkey
Reviews : 2 Reviews
Student : 1 Students
Courses : 98 Courses

Reviews

0
Based on 0 Reviews
1 Stars
2 Stars
3 Stars
4 Stars
5 Stars