Tags
Language
Tags
August 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ethical Hacking and Penetration Testing

    Posted By: lucky_aut
    Ethical Hacking and Penetration Testing

    Ethical Hacking and Penetration Testing
    Duration: 6h 41m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.1 GB
    Genre: eLearning | Language: English

    Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.

    What you'll learn:
    In this course, you will learn:
    Overview of Information and Cyber Security
    Hacking and Ethical Hacking concepts
    Five Phases of Hacking
    Using tools for scanning and Vulnerability Assessment
    Malware based Attacks
    Man-in-the-Middle Attack
    VAPT of Web Servers and Web Application Servers
    Wireless Hacking

    Requirements:
    For taking this course, knowledge about Networking Basics and Servers will be an essential.
    Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
    Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

    Description:
    OVERVIEW
    Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
    Objective
    In this course, you will learn:
    Overview of Information and Cyber Security
    Hacking and Ethical Hacking concepts
    Five Phases of Hacking
    Using tools for scanning and Vulnerability Assessment
    Malware based Attacks
    Man-in-the-Middle Attack
    VAPT of Web Servers and Web Application Servers
    Wireless Hacking
    Target Audience
    This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
    Prerequisites
    For taking this course, knowledge about Networking Basics and Servers will be an essential.
    Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
    Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
    Module 1 : Introduction to Information Security 
    Information Security Overview
    Hacking and Ethical Concepts
    Hacking Phases
    Information Security Controls
    Penetration Testing Overview
    Module 02 : Footprinting 
    Footprinting Concepts
    Footprinting through Search Engines
    Footprinting through Web Services
    Footprinting through Social Networking Sites
    Module 03: Scanning Networks 
    Understanding TCP Flags
    Network Scanning Concepts
    Scanning Techniques
    Scanning Devices
    Module 04: Enumeration
    Enumeration Concepts
    Enumeration Methods and Tools
    Module 05: Vulnerability Assessment
    Vulnerability Assessment Concepts
    Vulnerability Assessment Solutions
    Vulnerability Scoring Systems
    Vulnerability Assessment Tools
    Vulnerability Assessment Reports
    Module 06: System Hacking
    System Hacking Concepts
    Cracking Passwords
    Escalating Privileges
    Executing Applications
    Hiding Files
    Covering Tracks
    Module 07: Malware Threats
    Malware Concepts
    Trojan Concepts
    Virus and Worm Concepts
    Malware Analysis
    Countermeasures
    Anti-Malware Software
    Module 08: Sniffing
    Sniffing Concepts
    Sniffing Technique: MAC Attacks
    Sniffing Technique: DHCP Attacks
    Sniffing Technique: ARP Poisoning
    Sniffing Technique: Spoofing Attacks
    Sniffing Technique: DNS Poisoning
    Module 09: Web Servers/Application VAPT
    Web Server/Application Assessment Methodology
    Web Server/Application Assessment Tools
    Web Server/Application VAPT and Reporting
    Module 10: Wireless Network VAPT
    Wi-Fi Authentication Modes
    Wireless Encryption Protocols
    Wireless Network VAPT and Reporting

    Who this course is for:
    This course is for Students/IT Professionals who is interested in becoming Information Security and Cyber Security professionals.

    More Info