about this course
This course will be demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.Ethical hacking is performed by an individual or a company to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could
Topic to be covered
Introduction
Kalinix overview
Navigating the file system
User and privileges
Basics of networking and wireless cracking using air crack
Database assessment and attacks
Web application analysis, using SQL map and WP scan
Password attacks using OPH crack and jack the ripper
Vulnerability reporting methods
Career advice and path
Learning Outcomes
Pre-requisites
Having knowledge of computer science which includes basic networking and operating system concepts
Expected takeaways
Course will give you fundamental concepts of ethical hacking which includes info gathering, vulnerability analysis, types of attacks and methods exploitation tools and vulnerability reporting ecosystem.
Above Fee is exclusive of GST, Taxes and convenience fee*