Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

The Complete Ethical Hacker Course

Course Cover
compare button icon

Course Features

icon

Duration

23.29 hours

icon

Delivery Method

Online

icon

Available on

Lifetime Access

icon

Accessibility

Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Teaching Type

Self Paced

icon

Video Content

23.29 hours

Course Description

This course is the best in ethical hacking and covers 20 of the most important security domains that any ethical hacker needs to know if they want to improve their organization's information security. This course covers 20 modules that cover over 270 common attack technologies used by hackers. The course's goal is to teach you how to ethically hack in a situation where you are either doing penetration testing or ethical hacking. The course will teach you:
The key issues plaguing information security, incident management, penetration testing. Various types and foot-printing tools. Enumeration techniques. Enumeration countermeasures. Network scanning techniques. Security techniques and countermeasures. Wi-Fi Hacking, wireless encryption, wireless hacking methodology. Wireless security tools. Mobile platform attack vector. Android vulnerabilities. Jailbreaking iOS. Mobile security guidelines. and tools Firewall, IDS, honeypot evasion techniques. Countermeasures. Various types and types of security techniques and cryptography attacks. This course will help you become an ethical hacker.

Course Overview

projects-img

Virtual Labs

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

Prerequisites/Requirements

No prerequisites mentioned

What You Will Learn

Key issues plaguing the information security world, incident management process, and penetration testing

Various types of foot-printing, foot-printing tools, and countermeasures

Network scanning techniques and scanning countermeasures

Enumeration techniques and enumeration countermeasures

System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures

Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures

DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures

Different types of webserver attacks, attack methodology, and countermeasures

SQL injection attacks and injection detection tools

Wi-Fi Hacking, wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures

Various cloud computing concepts, threats, attacks, and security techniques and tools

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing road map

Target Students

If you want to do exciting work and enjoy the salaries that ethical hackers make

Course Instructors

Mohamed Atef

Instructor

Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+
Course Cover