Ethical Hacking And Prevention - Online Training
- Offered byZOOM Technology
Ethical Hacking And Prevention - Online Training at ZOOM Technology Overview
Duration | 2 weeks |
Total fee | ₹9,900 |
Mode of learning | Online |
Credential | Certificate |
Ethical Hacking And Prevention - Online Training at ZOOM Technology Highlights
- Earn Ethical Hacking and Prevention certification from US-Council
Ethical Hacking And Prevention - Online Training at ZOOM Technology Course details
- Introduction to Ethical Hacking
- Footprinting, Scanning, and Enumeration
- Hacking Web servers and Web applications
- DoS, SQL injection, Buffer overflow attacks
- Cryptography
- Wireless hacking
- Linux Hacking
- Phishing
- Countermeasure
- This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain
- This course is entirely hands on and real time oriented
- The instructors are network security and intrusion specialists with several years of experience
Ethical Hacking And Prevention - Online Training at ZOOM Technology Curriculum
Introduction to Ethical Hacking
What is Hacking
Who is a Hacker
Skills of a Hacker
Types of Hackers
Reasons for Hacking
Who are at the risk of Hacking attacks
Effects of Computer Hacking on an organization
Network Security Challenges
Elements of Information Security
The Security, Functionality & Usability Triangle
What is Ethical Hacking
Why Ethical Hacking is Necessary
Scope & Limitations of Ethical Hacking
What is Penetration Testing
What is Vulnerability Auditing
Foot Printing
What is Foot Printing
Objectives of Foot Printing
Finding a company's details
Finding a company's domain name
Finding a company's Internal URLs
Finding a company's Public and Restricted URLs
Finding a company's Server details
Finding the details of domain registration
Finding the range of IP Address
Finding the DNS information
Finding the services running on the server
Finding the location of servers
Traceroute analysis
Tracking e-mail communications
Scanning
What is network scanning
Objectives of network scanning
Finding the live hosts in a network
SNMP Enumeration
SMTP Enumeration
DNS Enumeration
Finding open ports on a server
Finding the services on a server
OS fingerprinting
Server Banner grabbing tools
What is a Vulnerability Scanning
Vulnerability Scanner tools
Finding more details about a vulnerability
What is a proxy server
How does proxy server work
Types of proxy servers
How to find proxy servers
Why do hackers use proxy servers
What is a TOR network
Why hackers prefer to use TOR networks
Hacking Web Servers & Web Applications
What is a web server
Different webserver applications in use
Why are webservers hacked & its consequences
Directory traversal attacks
Website defacement
Website password brute forcing
How to defend against web server hacking
Session Hijacking
What is session hijacking
Dangers of session hijacking attacks
Session hijacking techniques
Cross-Site scripting attack
Session hijacking tools
How to defend against session hijackin