Course details
Introduction:
This Course will teach you how to set up an environment to practice your Cybersecurity, Ethical Hacking and Pen testing skills such as Launching a cyberattack, verifying vulnerabilities, Conducting research projects and Much more. After this Course I am sure you will never ask someone to provide you EVE NG qcow2 images as you will learn how to convert any type of image to qcow2 with 4 different methods also, you will easily troubleshoot EVE NG errors which you are facing on daily basis. you will
discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable such as Metasploitable, OWASP, phpAuction, DVWA, Mutillidae etc. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without your production environment.
Who Should Attend:
Anyone who wants to learn cyber security and apply its principles in a risk-free environment should take this course. If you want to master cyber security research and learn hacking tools, then this is a perfect place to start.
Attacks:
Reconnaissance Attack
MAC Flooding Attack
Ping of Death Attack
ICMP Flooding Attack
SYN Flooding Attack
Smurf Attack
LAND Attack
Slowloris Attack
ARP Spoofing Attack
DHCP Starvation Attack
DHCP Spoofing Attack
Password Attack
Phishing Attack
SQL Injection Attack
Command Execution Attack
Attacker Systems:
Kali Linux OS
Parrot OS Setup
Backbox Setup
Vulnerable Web Applications:
bWAPP
Metasploitable
OWASP
PHP Auction Site
Updated on 02 May, 2023- GDPR Diploma Skill-UpUSD 19Duration: Upto 3 Hours
- Cyber Security Specialist Diploma Skill-UpUSD 241Duration: Upto 230 Hours