Certified Ethical Hacker Proficiency (Advanced Level)
- Offered bySkillsoft
Certified Ethical Hacker Proficiency (Advanced Level) at Skillsoft Overview
Duration | 1 hour |
Total fee | ₹25,445 |
Mode of learning | Online |
Difficulty level | Advanced |
Official Website | Go to Website |
Credential | Certificate |
Future job roles | Project Engineer , Network & System Administrator |
Certified Ethical Hacker Proficiency (Advanced Level) at Skillsoft Highlights
- Earn a certificate after completion of the course
- Learn from industry best faculty
Certified Ethical Hacker Proficiency (Advanced Level) at Skillsoft Course details
Site administrators
Auditors
Security practitioners
Security officers
Define session hijacking, describe how it can be accomplished, and recognize the different types
Define the five core elements of cybersecurity
Describe common application level session hijacking attacks such as man-in-the-middle, man-in-the-browser, cross-site scripting (XSS), and cross-site request forgery (XSRF)
Describe common session-hijacking security controls and countermeasures like detection methods and tools, as well as best-practices like using encrypted protocols and secure session handling techniques
Describe ethical hacking, how it can be a great tool for helping to create a more secure network, and the skills and limitations common to ethical hackers
Describe footprinting and recognize the different types of information you can gather in this initial stage of attack
Describe Google Dorks, recognize some of the useful advanced search features of the Google search engine, and recognize how these features may be used to discover vulnerabilities and sensitive information with our targets
Describe Inverse TCP scans, how to issue an Inverse TCP scan with nmap, and the pros and cons of this scan type
Describe risk as it pertains to cybersecurity, recognize the risk levels, and use a risk matrix to visualize risk
Describe Stealth scans, how to issue a Stealth scan with nmap, and the pros and cons of using this scan type
Describe TCP Connect scans, how to issue a TCP Connect scan with nmap, and the pros and cons of using this type of scan
Recognize commonly used footprinting tools that will help you with not only the exam, but that are employed in real-life as well
Recognize common standards and regulations that pertain to the varied world industries and organizations
Recognize how attackers can use wordlists for purposes such as fuzzing and password attacks, the usefulness of custom wordlists, and how to generate a wordlist based on a target's web presence
Recognize how e-mail tracking systems can glean info like IP addresses, geo-location, and host operating systems
Recognize how risk management helps to minimize the negative effects of risk and the five phases of risk management
Recognize how to discover the public network info associated with your target
Recognize how to gather and inspect metadata for possible sensitive info about a target
Recognize security controls that could be recommended to a client to help them better protect against an attacker's footprinting and recon efforts
Recognize the details of common network-based session hijacking attacks such as UDP, TCP, and RST hijacking used to perform man-in-the-middle attacks
Recognize the types and use of artificial intelligence and machine learning and the role they play in the current cybersecurity battlefield
Recognize what it means to be a hacker and the common hacker classes, as well as the five phases of hacking
This course is designed for cybersecurity professionals who have mastered the foundational skills of ethical hacking and are looking to advance their expertise in network security, attack methodologies, and penetration testing
This advanced-level course takes a deep dive into the complex techniques and strategies used by both malicious hackers and ethical hackers, with a focus on offensive security, vulnerability assessment, and threat mitigation