• LOGIN
  • No products in the basket.

Overview             

This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding a large salary. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.

This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).

Course Description:

This online training course is comprehensive and designed to cover the key topics listed under the curriculum.

Course Duration:

You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.

Method of Assessment:

At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.

Certification:

Successful candidates will be awarded a certificate for Ethical Hacking Essential Training.

(This course is not included the official certificate)

Entry Requirement:

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

Career Path:

This training course will lead you to become a:

  • Penetration Tester
  • Cyber Security Analyst
  • Ethical Hacker
  • Security Architect
  • Information Security Officer
  • Security Consultant
  • Senior Security Consultant

 

Still not convinced?

Download our course brochure & learn more about this course.

Course Curriculum

MODULE 1 - INTRODUCTION TO ETHICAL HACKING
1. Introduction 00:00:00
2. Introduction to Hacking 00:00:00
3. Information Security Threats and Attack Vectors 00:00:00
4. Hacking Concepts 00:00:00
5. Ethical Hacking Concepts and Scope 00:00:00
6. Information Security Controls Part 1 00:00:00
7. Information Security Controls Part 2 00:00:00
8. Information Security Laws and Standards 00:00:00
MODULE 2 - FOOTPRINTING AND RECONNAISSANCE
1. Footprinting and Reconnaissance 00:00:00
2. Footprinting Methodology 00:00:00
3. Google Hacking 00:00:00
4. FootPrinting through Social Networking 00:00:00
5. Website Foot Printing 00:00:00
6. Email Foot Printing 00:00:00
7. Competitive Intelligence Gathering 00:00:00
8. WhoIs Foot Printing 00:00:00
9. DNS Logical and Geographical Foot Printing 00:00:00
10. Network Footprinting 00:00:00
11. Foot Printing 00:00:00
12. Foot Printing Tools 00:00:00
13. Foot Printing Penetration Testing 00:00:00
14. Conduct Recon with Ping Act 00:00:00
15. Query DNS with NSLookUp Act 00:00:00
16. Discover Website Subdomain with Sublist3r Act 00:00:00
17. Obtain OSINT Information about a Person with Pipl Act 00:00:00
18. Gather Contact and Host Information with theHarvester Act 00:00:00
19. Automate OSINT Research with Recon-ng Act 00:00:00
20. Get Started with Metasploit Act 00:00:00
21. Conduct Open Source Intelligence with OSR Framework Act 00:00:00
22. Obtain Whois Information with Smart Whois Act 00:00:00
23. Extract Links, URLs, and Emails from Websites with Web Data Extractor Act 00:00:00
24. Create an Offline Copy of a Website with HTTrack Act 00:00:00
25. Trace an Email with eMail Tracker Pro Act 00:00:00
MODULE 3 - NETWORK SCANNING
1. Network Scanning 00:00:00
2. Discovery Scans 00:00:00
3. Port Scans 00:00:00
4. Nmap 00:00:00
5. Nmap Stealth Scans 00:00:00
6. Nmap Options 00:00:00
7. H-ping and Other Scanners 00:00:00
8. SSDP Scanning 00:00:00
9. Scanning Beyond IDS and Firewall 00:00:00
10. Banner Grabbing 00:00:00
11. Scanning Pen Testing 00:00:00
12. Checking for Live Systems with Angry IP Scanner Act 00:00:00
13. Network Scanning with MegaPing Act 00:00:00
14. Advanced Scanning with nmap Act 00:00:00
15. Packet Crafting with Hping3 Act 00:00:00
16. Packet Crafting with Colasoft Packet Builder Act 00:00:00
MODULE 4 – ENUMERATION
1. Enumeration 00:00:00
2. Enumeration Technicques Tools 00:00:00
3. NetBIOS Enumeration 00:00:00
4. SNMP Enumeration 00:00:00
5. LDAP Enumeration 00:00:00
6. NTP Enumeration 00:00:00
7. SMTP and DNS Enumeration 00:00:00
8. Enumeration Countermeasures 00:00:00
9. Enumeration Penetration Testing 00:00:00
10. Enumerate NetBIOS Information with SuperScan Act 00:00:00
11. Enumerate NetBIOS Information with NetBIOS Enumerator Act 00:00:00
12. Enumerate NetBIOS and LDAP Information with Hyena Act 00:00:00
13. Enumerate SNMP WMI and Other Information Using SoftPerfect Network Scanner Act 00:00:00
MODULE 5 - VULNERABILITY ANALYSIS
1. Vulnerability Analysis 00:00:00
2. Vulnerability Assessment Solutions 00:00:00
3. Vulnerability Scoring Systems 00:00:00
4. Vulnerability Assessment Tools and Reports 00:00:00
5. Perform a Vulnerability Scan and Analysis with Nessus Ac 00:00:00
MODULE 6 - MALWARE THREATS
1. Malware Threats 00:00:00
2. Trojan Concepts 00:00:00
3. Trojan Types 00:00:00
4. Trojan Tools 00:00:00
5. Virus and Worm Concepts 00:00:00
6. Virus Types 00:00:00
7. Malware Analysis 00:00:00
8. Malware Reverse Engineering 00:00:00
9. Malware Detection 00:00:00
10. Malware Countermeasures 00:00:00
11. Malware Penetration Testing 00:00:00
12. Infect a Victim with a Remote Access Trojan Act 00:00:00
MODULE 7 – SNIFFING
1. Sniffing Concepts 00:00:00
2. DHCP Attacks 00:00:00
3. MAC Attacks 00:00:00
4. ARP Poisoning 00:00:00
5. DNS Poisoning 00:00:00
6. Sniffing Tools 00:00:00
7. Sniffing Countermeasures 00:00:00
8. Sniff a Clear Text HTTP Session with Wireshark Act 00:00:00
9. Intercept and Crack a Network Login Act 00:00:00
MODULE 8 - SOCIAL ENGINEERING
1. Social Engineering 00:00:00
2. Human Based Social Engineering 00:00:00
3. Computer Based Social Engineering 00:00:00
4. Additional Types of Social Enginnering 00:00:00
5. Social Engineering Countermeasures 00:00:00
6. Social Engineering Penetration Testing 00:00:00
7. Fool a User with a Baited USB Stick Act 00:00:00
8. Harvest Credentials with Spear Phishing Act 00:00:00
MODULE 9 - DENIAL OF SERVICE
1. Denial of Service 00:00:00
2. Common Dos-DDoS Attack Types 00:00:00
3. Additional DoS Attack Types 00:00:00
4. BotNets 00:00:00
5. DoS Countermeasures 00:00:00
6. Additional DoS Countermeasures 00:00:00
7. DoS Penetration Testing 00:00:00
8. Perform a DoS Attack With the Low Orbit ION Cannon Act 00:00:00
9. Step Up the DoS Attack With the High Orbit ION Cannon Act 00:00:00
10. Perform a Slowloris DoS Attack Act 00:00:00
MODULE 10 - SESSION HIJACKING
1. Session Hijacking 00:00:00
2. Browser Session Hijacking 00:00:00
3. Way to Compromise a Session Token 00:00:00
4. Client Side Attacks 00:00:00
5. Hijacking at the Network Level 00:00:00
6. Session Hijacking Tools 00:00:00
7. Session Hijacking Countermeasures 00:00:00
8. Session Hijacking Testing 00:00:00
9. Perform a MITM Attack with Ettercap Act 00:00:00
MODULE 11 - HACKING WEBSERVERS
1. Hacking Web Servers 00:00:00
2. Webserver Attacks 00:00:00
3. Methodology of Webserver Attacks 00:00:00
4. Webserver Attack and Defense Tools 00:00:00
5. Webserver General Defense 00:00:00
6. Webserver Specific Attack Countermeasures 00:00:00
7. Webserver Patch Management 00:00:00
8. Webserver Pen Testing 00:00:00
9. Footprint a Web Server with IDServe Act 00:00:00
10. Conduct a Simple Web Server Vulnerability Scan with Uniscan Act 00:00:00
11. Conduct a Comprehensive Web Server Vulnerability Scan with Uniscan Act 00:00:00
12. Brute Force a Web Server with Medusa Act 00:00:00
MODULE 12 - HACKING WEB APPLICATIONS
1. Hacking Web Applications 00:00:00
2. Web App Vulnerabilities and Exploits 00:00:00
3. Web Application Threats 00:00:00
4. Injection Attacks 00:00:00
5. Hidden Fields and Clickjacking 00:00:00
6. Cross Site Attacks 00:00:00
7. Additional Web App Attacks 00:00:00
8. Web Hacking Methodology 00:00:00
9. Web App Hacking Countermeasures 00:00:00
10. Web App Security Tools 00:00:00
11. Web Application Penetration Testing 00:00:00
12. Conduct a Simple Command Injection Attack Act 00:00:00
13. Inject a Malicious Link with Cross Site Scripting Act 00:00:00
14. Conduct a Cross Site Request Forgery Attack 00:00:00
MODULE 13 - SQL INJECTION
1. SQL Injection 00:00:00
2. Types of SQL Injection 00:00:00
3. SQL Injection Methodology 00:00:00
4. SQL Injection Tools 00:00:00
5. SQL Injection Countermeasures 00:00:00
6. SQL Injection Penetration Testing 00:00:00
7. SQL Injection Act 00:00:00
MODULE 14 - HACKING WIRELESS NETWORKS
1. Hacking Wireless Networks 00:00:00
2. Wireless Discovery and Mapping 00:00:00
3. WiFi Sniffers 00:00:00
4. WiFi Attacks 00:00:00
5. WiFi Cracking 00:00:00
6. Wireless Hacking Tools 00:00:00
7. Bluetooth Hacking 00:00:00
8. Wireless Hacking Countermeasures 00:00:00
9. Wireless Security Tools 00:00:00
10. Wireless Penetration Testing 00:00:00
11. Crack a WEP Key with Aircrack-ng Act 00:00:00
12. Crack a WPA Key with Aircrack-ng Act 00:00:00
MODULE 15 - SYSTEM HACKING
1. System Hacking Methodology 00:00:00
2. Windows System Vulnerabilities and Exploits 00:00:00
3. Linux System Vulnerablities and Exploits 00:00:00
4. Password Cracking Methods 00:00:00
5. Network Service Password Cracking 00:00:00
6. Windows Password Cracking 00:00:00
7. Linux Password Cracking 00:00:00
8. Password Cracking Tools 00:00:00
9. Other Methods of Obtaining Passwords 00:00:00
10. Keylogging 00:00:00
11. Spyware 00:00:00
12. RootKits 00:00:00
13. Hiding Files 00:00:00
14. Steganography 00:00:00
15. Privilege Escalation 00:00:00
16. Creating and Maintaining Remote Access 00:00:00
17. Hiding Evidence 00:00:00
18. System Hacking Penetration Testing 00:00:00
19. Spoof Name Resolution and Capture Credentials with Responder Act 00:00:00
20. Dump and Crack Password Hashes with pwdump7 and Ophcrack Act 00:00:00
21. Crack Passwords with L0pht7 Act 00:00:00
22. Exploit Client Side Vulnerabilities Act 00:00:00
23. Track User Activity with Spyware Act 00:00:00
24. View and Clear Audit Policies with Auditpol Act 00:00:00
25. Hide Data Using Whitespace Steganography Act 00:00:00
26. Hide Data Using Least Significant Bit Steganography Act 00:00:00
27. Cover Your Tracks Act 00:00:00
MODULE 16 - HACKING MOBILE PLATFORMS
1. Hacking Mobile Platforms 00:00:00
2. Hacking Android OS 00:00:00
3. Rooting Android 00:00:00
4. Securing Android 00:00:00
5. Hacking iOS 00:00:00
6. Jailbreaking iOS 00:00:00
7. Securing iOS 00:00:00
8. Hacking Windows Phone OS 00:00:00
9. Hacking Blackberry 00:00:00
10. Mobile Device Management 00:00:00
11. Mobile Security Guidelines and Tools 00:00:00
12. Mobile Penetration Testing 00:00:00
13. Prepare Your Wireless Email Environment Act 00:00:00
14. Pwn a Mobile Device with Metasploit Act 00:00:00
15. Use a Mobile Device in a DDoS Campaign Act 00:00:00
16. Return Your VMs to Original Configuration Act 00:00:00
17. Uninstall Main Activity Malware from Android Act 00:00:00
MODULE 17 - EVADING IDS, FIREWALLS, AND HONEYPOTS
1. Evading IDS Firewalls and Honeypots 00:00:00
2. Firewalls 00:00:00
3. Honeypots 00:00:00
4. IDS Firewalls and Honeypots Tools 00:00:00
5. Evasion 00:00:00
6. Evasion Countermeasures 00:00:00
7. IDS Firewall Honeypot Penetration Testing 00:00:00
8. Fly Below IDS Radar Act 00:00:00
9. Test and Analyze a Honey Pot Act 00:00:00
10. Bypass Windows Firewall Act 00:00:00
MODULE 18 – CRYPTOGRAPHY
1. Cryptography 00:00:00
2. Encryption Algorithms 00:00:00
3. Cryptography Tools 00:00:00
4. Public key Infrastructure 00:00:00
5. Email Encryption 00:00:00
6. Disk Encryption 00:00:00
7. Cryptography Attacks 00:00:00
8. Crytography Penetration Testing 00:00:00
9. Crytography Penetration Testing 00:00:00
10. Protect Data with Symmetric Encryption Act 00:00:00
11. Protect Data with Asymmetric Encryption Act 00:00:00
MODULE 19 - CLOUD COMPUTING
1. Cloud Computing 00:00:00
2. Virtualization 00:00:00
3. Cloud Computing Threats 00:00:00
4. Countermeasures to Cloud Computing Threats 00:00:00
5. Cloud Computing Attacks 00:00:00
6. Cloud Security 00:00:00
7. Cloud Security Best Practices 00:00:00
8. Cloud Penetration Testing 00:00:00
MODULE 20 - IOT HACKING
1. IoT Hacking 00:00:00
2. IoT Vulnerabilities and Attacks 00:00:00
3. IoT Hacking Methodology and Tools 00:00:00
4. IoT Hacking Countermeasures 00:00:00
5. IoT Penetration Testing 00:00:00
6. Search the Internet for Vulnerable IoT Devices Act 00:00:00
7. Conclusion 00:00:00

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

CPD Accredited

UKRLP

ACCREDITED CERTIFICATE

certificate

Awarded by iAP

Awarded by iAP

CPD Accredited Partner

CPD Accredited

CPD Membership No: 10582

Study independently accredited and recognised CPD courses. Gain your certification today.

cvAll students enrolled with STUDY365 are entitled to a CV Writing and Interview Skills Pack, which includes CV templates, cover letter guidance, and advice for interviews.
MORE INFO

cvIf you need career support STUDY365 is here for you. We provide excellent career support through our Career Support Service.
MORE INFO

TOTUM Card

Totum Card




Address: Study365, 406 White Horse Lane, London E1 3FY

Certificate Code

Secure Payment
top