عبر الإنترنت
Study 365 Ethical Hacking Beginner To Expert Study 365
  • مدة الدورة التدريبية: 12 ساعة إبدأ الآن
  • معتمدة من قبل: iAPCPD Certification Service
  • الشهادة:
  • طريقة تقديم الدورة: عبر عرض الفيديو

تفاصيل الدورة

Overview

Ethical Hacking Beginner To Expert - Level 3


Ethical hackers, also called ‘white hats’, are computer security experts who have the skills to gain unauthorized access to a computer or data. In this course, you will go from a computer beginner to a proficient ethical hacker, ready to start a career in cybersecurity.

This course is specifically designed for those with no prior training or knowledge in hacking and cybersecurity. The intention is to give learners the education on how exactly to hack systems like a pro as well as secure systems like a professional security expert.

Why You Should Consider Taking this Course at Study365?
Study365 is a leading online provider for several accrediting bodies, and provides learners the opportunity to take this accredited iAP course. At Study365, we give our fullest attention to our learners’ needs and ensure they have the necessary information required to proceed with the training.

Learners who register will be given excellent learning support, discounts for future purchases and be eligible for a TOTUM Discount card and Student ID card with amazing offers and access to retail stores, the library, cinemas, gym memberships and their favourite restaurants.

Description

Learning Outcome
  • How To Become an elite ethical Hacker
  • How To Hack into Wireless Networks
  • How To Bypass Antivirus
  • How To Start a Cybersecurity/Ethical Hacking Career
  • How to build an ethical hacker personal brand from scratch
Curriculum

[Module 01]
Course Introduction
  • Course Overview
  • About your instructor
  • Section overview
  • Current cybersecurity Market
  • The 3types of hackers
  • The 4 elements of security
  • Ethical hacking terminology
  • Common methods of hacking
  • Cybersecurity and ethical hacking overview
  • Ethical hacking vs pentration testing
  • Job opportunities in cybersecurity
  • Who’s this course for
[Module 02]Networking Basics
  • Networking section overview
  • How data travels across the internet
  • Understanding ports and protocols
  • Public and private ip’s overview
  • What are subnets
  • The average network vs remote based
[Module 03]Setting Up Your Hacking Labs
  • Hacking lab section overview
  • Understanding virtual machines 3
  • Setup your kali linux machine
  • Vn setup and testing vulnerable systems
[Module 04]Linux/Python/Bash & Powershell Basics
  • Linux+ python + bash + powershell basics overview
  • Linux basics
  • Working with directories and moving files
  • Installing and updating application files
  • Linux text editors
  • Searching for files
  • Bash scripting
  • Python basics
[Module 05]How To Remain Anonymous On The Web
  • Remaining anonymous section overview
  • Tor browser overview
  • Anonsurf overview
  • Changing mac addresses
  • Using a virtual private network/server(vpn,vps)
[Module 06]How To Hack into Wifi
  • Wifi hacking section overview
  • Wifi hacking system setup
  • Wep hacking attack #1
  • Wep hacking attack #2
  • Wpa & wpa2 hacking
[Module 07]Passive And Active Reconnaissance
  • Reconnaissance section overview
  • Passive recon vs active recon
  • Recon-ng overview
  • Whois enum
  • Dns enumeration overview
  • Netcraft dns information
  • Google hacking overview
  • Shodan overview
  • Securityheaders(analyze http headers of the website)
  • Sssllabs/ssltest(look for ssl issues on website)
  • Pastebin(sensitive information)
  • Nmap port scanning(discover open ports, os, services, vulnerabilities etc)
  • Netcat overview + smb/nfs enumeration
  • Nikto & sparta web application scanner
  • Smtp enumeration + nessus/openvas scanners
[Module 08]Launching Attacks
  • Launching attacks overview
  • Analyzing information gathered
  • Taking advantage of telnet
  • Searching and understanding exploits
  • Copy exploits from searchsploit
  • Understanding exploits
  • Launching exploits
  • Brute force attacks
  • How to crack passwords
  • Arp spoofing overview
  • Introduction to cryptography
[Module 09]Post Exploitation
  • Post exploitation section overview
  • Privledge escalation
  • Transferring files in/out of victim, creating custom malware + evading antivirus
  • Installing a keylogger
  • Installing a backdoor
[Module 10]Website And Web Application Hacking
  • Website and web application hacking overview
  • Web application scanning
  • Directory buster hacking tool
  • Nikto web app hacking tool
  • Sqlmap and sql ninja overview
  • How to execute brute force attacks
  • Using command injection
  • Malicious file upload
  • Local & remote file inclusion
  • Sql injection overview
  • Using cross site request forgery
  • Cross site scripting overview
[Module 11]Mobile Phone Hacking And Security
  • Mobile phone hacking section overview
  • Mobile attack vectors
  • Mobile hacking using url
  • Jail breaking and rooting considerations
  • Privacy issues (geo location)
  • Mobile phone data security
[Module 12]Getting Your Name Out There As An Ethical Hacker
  • Getting your name out there section overview
  • Building a brand
  • Personal branding
  • Setup your website and blog
  • Writing a book
  • Starting a podcast
  • Networking overview
[Module 13]How To Make Money As An Ethical Hacker
  • Making money section overview
  • Bug and bounty programs
  • How to start freelancing
  • How to start client consulting
[Module 14]How To Start A Career In Cybersecurity
  • Potential salary and cybersecurity roadmap
  • Book recommendations
  • Places to practice hacking for free
Method of assessment
This is a knowledge-based course, and thus, will contain no method of assessment.

Certification
Upon the successful completion of the course, learners will be awarded an accredited Certificate of Completion for 'Ethical Hacking Beginner To Expert - Level 3' by iAP.

Awarding Body
The International Awards for Professionals (iAP) is an awarding body established in 1999 that aims to promote a high educational standard. They hope to create online education that is trustworthy and credible. Their globally recognised certifications allow learners to acquire the skills and knowledge needed to gain employment in the chosen fields.

About the Tutor
Juan Galvan is a visionary, marketer and digital entrepreneur. He has been effective in enabling digital businesses to reach the next level of success. He believes in continued education and wants to share his extensive knowledge and experience as a coach, consultant and strategist with ; Juan Galvan will guide you to make critical business decisions, develop unique ways to deliver products in the marketplace and have clarity and confidence in your business. تحديث بتاريخ 01 March, 2024

المتطلبات

  • Learners should be over the age of 16, and have a basic understanding of English, ICT and numeracy
  • Basic IT/Computer Skills & Knowledge
  • Computer With 8GB of RAM/Memory (Less is ok, but your computer may run slow!)
  • Wifi Hacking Section Only: USB Wireless Adapter

نبذة عن معهد Study 365

Study 365 is an online course provider, offering more than 400 courses to students across the globe. We have built a solid reputation which has elevated us to become one of the most trusted and reliable course providers in the online learning marketplace. With over 100,000 students on our books, we’re the preferred choice for many online learners.

سجل 648 طالباً في معهد Study 365 عبر Laimoon
عرض الجميع دورات Study 365

قيِم هذه الصفحة