Menu
  • No products in the basket.

Ethical Hacking Certification

0( 0 REVIEWS )
497 STUDENTS
Overview              Ethical Hacking Certification – This will allow students to deploy proactive countermeasures and in turn, stay ahead of information …

Overview             

Ethical Hacking Certification – This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding a large salary. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.

This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).

  • Course Description:
  • Course Duration:
  • Method of Assessment:
  • Certification:
  • Entry Requirement:
  • Career Path:

This online training course is comprehensive and designed to cover the key topics listed under the curriculum.

You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.

At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.

Successful candidates will be awarded a certificate for Ethical Hacking Essential Training.

(This course is not included the official certificate)

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

This training course will lead you to become a:

  • Penetration Tester
  • Cyber Security Analyst
  • Ethical Hacker
  • Security Architect
  • Information Security Officer
  • Security Consultant
  • Senior Security Consultant

 

[vc_row][vc_column][vc_cta h2="Still not convinced?" add_button="left" btn_title="Download Brochure" btn_color="green" btn_i_icon_fontawesome="fa fa-file-pdf-o" btn_add_icon="true" btn_link="url:https%3A%2F%2Fwww.study365.co.uk%2Fwp-content%2Fuploads%2F2018%2F09%2F3.-Ethical-Hacking-Certification.pdf||target:%20_blank|" btn_custom_onclick="true" css=".vc_custom_1475836716759{background-color: #ffffff !important;}"]Download our course brochure & learn more about this course.[/vc_cta][/vc_column][/vc_row]

Course Curriculum

MODULE 1 - INTRODUCTION TO ETHICAL HACKING
1. Introduction
2. Introduction to Hacking
3. Information Security Threats and Attack Vectors
4. Hacking Concepts
5. Ethical Hacking Concepts and Scope
6. Information Security Controls Part 1
7. Information Security Controls Part 2
8. Information Security Laws and Standards
MODULE 2 - FOOTPRINTING AND RECONNAISSANCE
1. Footprinting and Reconnaissance
2. Footprinting Methodology
3. Google Hacking
4. FootPrinting through Social Networking
5. Website Foot Printing
6. Email Foot Printing
7. Competitive Intelligence Gathering
8. WhoIs Foot Printing
9. DNS Logical and Geographical Foot Printing
10. Network Footprinting
11. Foot Printing
12. Foot Printing Tools
13. Foot Printing Penetration Testing
14. Conduct Recon with Ping Act
15. Query DNS with NSLookUp Act
16. Discover Website Subdomain with Sublist3r Act
17. Obtain OSINT Information about a Person with Pipl Act
18. Gather Contact and Host Information with theHarvester Act
19. Automate OSINT Research with Recon-ng Act
20. Get Started with Metasploit Act
21. Conduct Open Source Intelligence with OSR Framework Act
22. Obtain Whois Information with Smart Whois Act
23. Extract Links, URLs, and Emails from Websites with Web Data Extractor Act
24. Create an Offline Copy of a Website with HTTrack Act
25. Trace an Email with eMail Tracker Pro Act
MODULE 3 - NETWORK SCANNING
1. Network Scanning
2. Discovery Scans
3. Port Scans
4. Nmap
5. Nmap Stealth Scans
6. Nmap Options
7. H-ping and Other Scanners
8. SSDP Scanning
9. Scanning Beyond IDS and Firewall
10. Banner Grabbing
11. Scanning Pen Testing
12. Checking for Live Systems with Angry IP Scanner Act
13. Network Scanning with MegaPing Act
14. Advanced Scanning with nmap Act
15. Packet Crafting with Hping3 Act
16. Packet Crafting with Colasoft Packet Builder Act
MODULE 4 – ENUMERATION
1. Enumeration
2. Enumeration Technicques Tools
3. NetBIOS Enumeration
4. SNMP Enumeration
5. LDAP Enumeration
6. NTP Enumeration
7. SMTP and DNS Enumeration
8. Enumeration Countermeasures
9. Enumeration Penetration Testing
10. Enumerate NetBIOS Information with SuperScan Act
11. Enumerate NetBIOS Information with NetBIOS Enumerator Act
12. Enumerate NetBIOS and LDAP Information with Hyena Act
13. Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act
MODULE 5 - VULNERABILITY ANALYSIS
1. Vulnerability Analysis
2. Vulnerability Assessment Solutions
3. Vulnerability Scoring Systems
4. Vulnerability Assessment Tools and Reports
5. Perform a Vulnerability Scan and Analysis with Nessus Ac
MODULE 6 - MALWARE THREATS
1. Malware Threats
2. Trojan Concepts
3. Trojan Types
4. Trojan Tools
5. Virus and Worm Concepts
6. Virus Types
7. Malware Analysis
8. Malware Reverse Engineering
9. Malware Detection
10. Malware Countermeasures
11. Malware Penetration Testing
12. Infect a Victim with a Remote Access Trojan Act
MODULE 7 – SNIFFING
1. Sniffing Concepts
2. DHCP Attacks
3. MAC Attacks
4. ARP Poisoning
5. DNS Poisoning
6. Sniffing Tools
7. Sniffing Countermeasures
8. Sniff a Clear Text HTTP Session with Wireshark Act
9. Intercept and Crack a Network Login Act
MODULE 8 - SOCIAL ENGINEERING
1. Social Engineering
2. Human Based Social Engineering
3. Computer Based Social Engineering
4. Additional Types of Social Enginnering
5. Social Engineering Countermeasures
6. Social Engineering Penetration Testing
7. Fool a User with a Baited USB Stick Act
8. Harvest Credentials with Spear Phishing Act
MODULE 9 - DENIAL OF SERVICE
1. Denial of Service
2. Common Dos-DDoS Attack Types
3. Additional DoS Attack Types
4. BotNets
5. DoS Countermeasures
6. Additional DoS Countermeasures
7. DoS Penetration Testing
8. Perform a DoS Attack With the Low Orbit ION Cannon Act
9. Step Up the DoS Attack With the High Orbit ION Cannon Act
10. Perform a Slowloris DoS Attack Act
MODULE 10 - SESSION HIJACKING
1. Session Hijacking
2. Browser Session Hijacking
3. Way to Compromise a Session Token
4. Client Side Attacks
5. Hijacking at the Network Level
6. Session Hijacking Tools
7. Session Hijacking Countermeasures
8. Session Hijacking Testing
9. Perform a MITM Attack with Ettercap Act
MODULE 11 - HACKING WEBSERVERS
1. Hacking Web Servers
2. Webserver Attacks
3. Methodology of Webserver Attacks
4. Webserver Attack and Defense Tools
5. Webserver General Defense
6. Webserver Specific Attack Countermeasures
7. Webserver Patch Management
8. Webserver Pen Testing
9. Footprint a Web Server with IDServe Act
10. Conduct a Simple Web Server Vulnerability Scan with Uniscan Act
11. Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act
12. Brute Force a Web Server with Medusa Act
MODULE 12 - HACKING WEB APPLICATIONS
1. Hacking Web Applications
2. Web App Vulnerabilities and Exploits
3. Web Application Threats
4. Injection Attacks
5. Hidden Fields and Clickjacking
6. Cross Site Attacks
7. Additional Web App Attacks
8. Web Hacking Methodology
9. Web App Hacking Countermeasures
10. Web App Security Tools
11. Web Application Penetration Testing
12. Conduct a Simple Command Injection Attack Act
13. Inject a Malicious Link with Cross Site Scripting Act
14. Conduct a Cross Site Request Forgery Attack
MODULE 13 - SQL INJECTION
1. SQL Injection
2. Types of SQL Injection
3. SQL Injection Methodology
4. SQL Injection Tools
5. SQL Injection Countermeasures
6. SQL Injection Penetration Testing
7. SQL Injection Act
MODULE 14 - HACKING WIRELESS NETWORKS
1. Hacking Wireless Networks
2. Wireless Discovery and Mapping
3. WiFi Sniffers
4. WiFi Attacks
5. WiFi Cracking
6. Wireless Hacking Tools
7. Bluetooth Hacking
8. Wireless Hacking Countermeasures
9. Wireless Security Tools
10. Wireless Penetration Testing
11. Crack a WEP Key with Aircrack-ng Act
12. Crack a WPA Key with Aircrack-ng Act
MODULE 15 - SYSTEM HACKING
1. System Hacking Methodology
2. Windows System Vulnerabilities and Exploits
3. Linux System Vulnerablities and Exploits
4. Password Cracking Methods
5. Network Service Password Cracking
6. Windows Password Cracking
7. Linux Password Cracking
8. Password Cracking Tools
9. Other Methods of Obtaining Passwords
10. Keylogging
11. Spyware
12. RootKits
13. Hiding Files
14. Steganography
15. Privilege Escalation
16. Creating and Maintaining Remote Access
17. Hiding Evidence
18. System Hacking Penetration Testing
19. Spoof Name Resolution and Capture Credentials with Responder Act
20. Dump and Crack Password Hashes with pwdump7 and Ophcrack Act
21. Crack Passwords with L0pht7 Act
22. Exploit Client Side Vulnerabilities Act
23. Track User Activity with Spyware Act
24. View and Clear Audit Policies with Auditpol Act
25. Hide Data Using Whitespace Steganography Act
26. Hide Data Using Least Significant Bit Steganography Act
27. Cover Your Tracks Act
MODULE 16 - HACKING MOBILE PLATFORMS
1. Hacking Mobile Platforms
2. Hacking Android OS
3. Rooting Android
4. Securing Android
5. Hacking iOS
6. Jailbreaking iOS
7. Securing iOS
8. Hacking Windows Phone OS
9. Hacking Blackberry
10. Mobile Device Management
11. Mobile Security Guidelines and Tools
12. Mobile Penetration Testing
13. Prepare Your Wireless Email Environment Act
14. Pwn a Mobile Device with Metasploit Act
15. Use a Mobile Device in a DDoS Campaign Act
16. Return Your VMs to Original Configuration Act
17. Uninstall Main Activity Malware from Android Act
MODULE 17 - EVADING IDS, FIREWALLS, AND HONEYPOTS
1. Evading IDS Firewalls and Honeypots
2. Firewalls
3. Honeypots
4. IDS Firewalls and Honeypots Tools
5. Evasion
6. Evasion Countermeasures
7. IDS Firewall Honeypot Penetration Testing
8. Fly Below IDS Radar Act
9. Test and Analyze a Honey Pot Act
10. Bypass Windows Firewall Act
MODULE 18 – CRYPTOGRAPHY
1. Cryptography
2. Encryption Algorithms
3. Cryptography Tools
4. Public key Infrastructure
5. Email Encryption
6. Disk Encryption
7. Cryptography Attacks
8. Crytography Penetration Testing
9. Crytography Penetration Testing
10. Protect Data with Symmetric Encryption Act
11. Protect Data with Asymmetric Encryption Act
MODULE 19 - CLOUD COMPUTING
1. Cloud Computing
2. Virtualization
3. Cloud Computing Threats
4. Countermeasures to Cloud Computing Threats
5. Cloud Computing Attacks
6. Cloud Security
7. Cloud Security Best Practices
8. Cloud Penetration Testing
MODULE 20 - IOT HACKING
1. IoT Hacking
2. IoT Vulnerabilities and Attacks
3. IoT Hacking Methodology and Tools
4. IoT Hacking Countermeasures
5. IoT Penetration Testing
6. Search the Internet for Vulnerable IoT Devices Act
7. Conclusion

Students feedback

N.A

Average rating ()
5 Star
4 Star
3 Star
2 Star
1 Star

No Reviews found for this course.

Copyright © 2021 -Study365 - All rights reserved.

WhatsApp chat