ZOOM Technology
ZOOM Technology Logo

Ethical Hacking And Prevention - Online Training 

  • Offered byZOOM Technology

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 
Overview

Enroll to this courses and learn both hacking and prevention techniques

Duration

2 weeks

Total fee

9,900

Mode of learning

Online

Credential

Certificate

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 
Highlights

  • Earn Ethical Hacking and Prevention certification from US-Council
Details Icon

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 
Course details

What are the course deliverables?
  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Countermeasure
More about this course
  • This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain
  • This course is entirely hands on and real time oriented
  • The instructors are network security and intrusion specialists with several years of experience

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 
Curriculum

Introduction to Ethical Hacking

What is Hacking

Who is a Hacker

Skills of a Hacker

Types of Hackers

Reasons for Hacking

Who are at the risk of Hacking attacks

Effects of Computer Hacking on an organization

Network Security Challenges

Elements of Information Security

The Security, Functionality & Usability Triangle

What is Ethical Hacking

Why Ethical Hacking is Necessary

Scope & Limitations of Ethical Hacking

What is Penetration Testing

What is Vulnerability Auditing

Foot Printing

What is Foot Printing

Objectives of Foot Printing

Finding a company's details

Finding a company's domain name

Finding a company's Internal URLs

Finding a company's Public and Restricted URLs

Finding a company's Server details

Finding the details of domain registration

Finding the range of IP Address

Finding the DNS information

Finding the services running on the server

Finding the location of servers

Traceroute analysis

Tracking e-mail communications

Scanning

What is network scanning

Objectives of network scanning

Finding the live hosts in a network

SNMP Enumeration

SMTP Enumeration

DNS Enumeration

Finding open ports on a server

Finding the services on a server

OS fingerprinting

Server Banner grabbing tools

What is a Vulnerability Scanning

Vulnerability Scanner tools

Finding more details about a vulnerability

What is a proxy server

How does proxy server work

Types of proxy servers

How to find proxy servers

Why do hackers use proxy servers

What is a TOR network

Why hackers prefer to use TOR networks

Hacking Web Servers & Web Applications

What is a web server

Different webserver applications in use

Why are webservers hacked & its consequences

Directory traversal attacks

Website defacement

Website password brute forcing

How to defend against web server hacking

Session Hijacking

What is session hijacking

Dangers of session hijacking attacks

Session hijacking techniques

Cross-Site scripting attack

Session hijacking tools

How to defend against session hijackin

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by ZOOM Technology

5.5 K
1 month
– / –
– / –
1 month
– / –
View Other 1 CoursesRight Arrow Icon
qna

Ethical Hacking And Prevention - Online Training
 at 
ZOOM Technology 

Student Forum

chatAnything you would want to ask experts?
Write here...