Course Overview
At the dawn of technologically advanced solutions, organizations face the challenge and responsibility to efficiently secure their systems and ensure the absence of any vulnerabilities as a precaution against the risks that come along with them. This issue can be best abated by the hiring of an ethical hacker β a professionally trained individual who follows official and legal protocols to investigate an organization's network and system by performing attacks on it and scrutinizing for any vulnerabilities that can be exploited and may cause harm to the organization's assets. In addition to weeding out vulnerabilities and figuring out the attack vectors, they can also assist in devising strategies for mitigating the discovered issues.
By opting to pursue this course, you will learn the fundamentals of hacking, penetration testing, network security, web application security, cloud computing, auditing, and much more.
Prerequisites
Before beginning the course, you should familiarize yourself with the basic concepts of computing, networking, and operating systems.
Training Modules
- Overview Of Cybersecurity
- Hacker Types
- Legal Frameworks
- CEH Methodology
- Classic Attack Techniques
- History Of Hacking
- Social-engineering Basics
- OSI Model
- TCP/IP
- Protocols
- Subnetting
- Packet Analysis
- Passive & Active Information Gathering
- OSINT Tools
- Google Dorks
- Nmap
- Port Scanning
- OS Fingerprinting
- Vulnerability Scanning
- NetBIOS
- SNMP
- LDAP
- DNS
- NTP Enumeration Techniques
- Password Cracking
- Privilege Escalation
- Keyloggers
- Stealth Techniques
- Meterpreter
- Pivoting
- Lateral Movement
- Maintaining Access
- IIS/Apache Attacks
- Web Cache Poisoning
- HTTP Response Splitting
- OWASP Top 10
- SQLi
- XSS
- CSRF
- IDOR
- File Inclusion Attacks
- Trojans
- Viruses
- Worms
- Ransomware Analysis
- Reverse Engineering Basics
- WEP/WPA Cracking
- Evil Twin Attacks
- Bluetooth Exploitation
- Encryption Standards
- PKI
- Hash Cracking
- Hiding Data In Media
- ARP Poisoning
- MITM
- Wireshark Analysis
- SSL Stripping
- DoS/DDoS Types
- SYN Flood
- Amplification Attacks
- Mitigation
- Evasion Techniques
- Payload Obfuscation
- Honeypot Detection
- Phishing
- Vishing
- Pretexting
- Physical Security Testing
- Android/iOS Attack Surfaces
- Mobile Malware
- MDM Bypass