Course Details
Ethical Hacking and Penetration Testing, Module 2
This course introduces the principles and techniques associated with the cybersecurity practice known as penetration testing or ethical hacking. This course covers the enumeration process in ethical hacking, vulnerability analysis, system Hacking, malware threats, sniffing, and social engineering.
This course is part of the following program(s)
1. Certified Ethical Hacking
Why This Course?
Upgrading Skills
After completing this course, students will be able to:
Understand the concepts of the enumeration process in ethical hacking
Learn how to perform vulnerability analysis in cyber security
Learn the concepts and practice of system Hacking
Build the practical knowledge of malware threats, sniffing, and social engineering.
Employment Opportunity
IT security officer, auditor, or engineer
Ethical Hacker
Penetration Tester
Main Topics
Enumeration types and techniques
Vulnerability Analysis
System Hacking
Malware Threats, Sniffing
Social Engineering
Training Methods
Instructor-led online lectures
Simulated/Offline labs
Our Other Courses
Client-Server Connectivity
This course will enable students to learn the technologies behind the connection between the client and server.
Cloud Computing- AWS Foundation
This course is particularly focused on Amazon Web Services (AWS). The students will gain an overall understanding of the ....
Cloud Computing- Google Cloud Foundation
This course is particularly focused on Google Cloud. The students will gain an overall understanding of the infrastructure and ....
Cloud Security
Students learn the models that integrate virtualization and networking to provide cloud computing services. Students acquire ....
Computer Networking
Students study networking concepts, and develop an understanding of the relationship between network hardware, topologies, ....