Professional Ethical Hacking
Course Description
Ethical hacking is one of the most in-demand career paths today because of the advancement of technology and the increasing number of systems and network attacks. Most organisations need this capability to identify their weaknesses and flaws before hackers do. We have designed this course to teach you the skills needed to identify protection opportunities and improve the security controls of systems and networks to reduce the risk associated with working on the internet.
We introduce the concept of ethical hacking and familiarise you with the Linux operating system and command-line interpreters. Next, you will explore the two major network models and study why an ethical hacker must understand network ports and protocols. We investigate cryptography and provide a demonstration of the functionalities of some encryption tools. You will also examine tools and techniques used in password cracking and the evolution of malicious software.
Before ethical hackers can gain access to a system, they must gather information about the target system. The concluding section will review active and passive reconnaissance and the tools used to collect information about a system. Then you will learn how to perform a vulnerability assessment of a system and discover ways to hack into a network device, server, web application and wireless network. Finally, we explain how to become adept at maintaining access to a system that has been compromised and the importance of covering your tracks after hacking a system. This course is essential for information system owners, cyber security engineers, penetration testers and others in any related field of study. Enrol today.
What you'll learn in this course?
-
Technology
-
Network Security
-
Cybersecurity
-
Linux
-
Ethical Hacking
-
Cryptography
-
Hacking
-
Penetration Testing
Course Curriculum
- Learning Outcomes
- Information Gathering- Reconnaissance-Passive (External Only)
- Social Engineering
- Reconnaissance-Active Scanning-Enumeration
- Vulnerability Assessment
- Network Attacks
- Hacking Servers
- Assessing and Hacking Web Technologies
- Hacking Wireless Networks
- Maintaining Access and Covering Tracks
- Lesson Summary
Adams Academy
London, Uk
By