Certificate in White Hat Hacking
- Offered byVSkills
Certificate in White Hat Hacking at VSkills Overview
Duration | 100 hours |
Total fee | ₹4,719 |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Future job roles | Project Engineer , Network & System Administrator |
Certificate in White Hat Hacking at VSkills Highlights
- Access to Online videos, tests & reference material.
- Government Certification; Unlimited email support
Certificate in White Hat Hacking at VSkills Course details
- Ethical hacker
- Security consultant
- Site administrator
- Penetration tester
- Security consultant
- Auditor
- Study material couriered to your address
- Government Certification
- Certification valued and approved by industry
- Ethical hacker uses the skills and tools of malicious tools to find out vulnerabilities in an organization computer?s system. This course is the most sought after and popular credential. It tests the applicants on plethora of areas in ethical hacking like network, knowledge of ethics and countermeasures for attacks, Linux, operating system windows and web based attack. Moreover, a certified ethical hacker does the corrective, preventive and protective measures to protect the system before an actual breach can happen.
Certificate in White Hat Hacking at VSkills Curriculum
Introduction
Ethical Hacking Evolution and Hacktivism
Need and Technical Terms
Skills Needed and Stages of Hacking
Ethical Hacking Modes
Networking Basics
Penetration Testing
Ethics
Moral Direction and Hacker Ethics Principles
Security Grey Areas
Cyber Laws (IT Act, etc.)
Rules of Engagement
Cryptography
Cryptography Basics
Evolution and Data Encryption Methods
Symmetric and Asymmetric key Cryptography
Private and Public Key Exchange
Stream and Block Ciphers
Secret Key Cryptography
Message Authentication and Hash Functions
Digital Signatures and Public Key Infrastructure
Footprinting
Information Gathering
DNS, whois and ARIN records
Using traceroute, e-mail tracking and web spider
Google Hacking
Social Engineering
Social Engineering Concepts
Social Engineering Attack Types
Countermeasures for Social Engineering
Physical Security
Basics and Need
Physical Security Countermeasures
Network Scanning and Enumeration
Network Scanning Techniques
Scanners and Analyzers
HTTP tunneling and IP spoofing
Enumerating null sessions and SNMP enumeration
Network Attacks
TCP/IP Packet Formats and Ports
Firewall and IDS
Switch Attacks
Router Attacks
DoS, DDoS, Session Hijacking
Wireless Networks
Wireless LAN Basics
WLAN Security
WLAN Attacks
WLAN Attack Countermeasures
System Hacking
Password Attacks, Vulnerabilities and Countermeasure
Spyware
Rootkit
Steganography
Trojans
Computer worm
Backdoor
Buffer Overflow
Windows Hacking
Memory and Process
Windows Architecture
Windows Security
Windows Attacks
Countermeasures
Windows Memory Protection, SEH and OllyDbg
Linux Hacking
Linux Basics
Linux Threats
Linux Security
Kernel Patching
Web Hacking
Web Basics
Web Server Attacks
Web Application Attacks
VoIP Attacks
Emerging Trends
Cloud Computing and Security
Identity Access Management
Security Policies
Mobile Security
New Threats