Ethical Hacking


The number of devastating cyberattacks is increasing, and it's likely to get much worse. Constantly growing adoption of the mobile Internet, cloud computing, and IoT have expanded the attack landscape, making cyber security the top of the agenda. This ominous need has increased the demand of ethical hackers and cybersecurity professionals, and these jobs are expected to grow at a rate of 37% till 2022.

Star Ethical Hacking Expert is a comprehensive training program that helps learners acquire a fundamental understanding of concepts like information security, hacking, and ethical hacking, and is a must-have guide for any IT security professional. This program covers discusses both basic as well as advanced hacking tools and techniques used by hackers and information security professionals alike, to break into an organizations information system. In this program, the learner will understand the logic behind hacking and the ways in which hackers go about it, thus enabling you to prevent any such acts. As they say, 'Prevention is better than cure!'

This program makes the learners aware and in charge of their systems and allows them to test, uncover, hack and fix vulnerabilities, and stay in complete control of their information. The program proceeds with detailing the process of hacking in five consequential stages including investigation, scanning, gaining access, maintaining access, and covering your tracks.

Audience

Beginner, Intermediate

Course Objectives

In this course, you will learn about:

Course Outcome

After completing this course, you will be able to:

Table of Contents Outline

EH1
  1. Exploring Ethical Hacking
  2. Associated Protocols
  3. Gathering Information about Target Computer Systems - Footprinting and Investigation
  4. Scanning Computers in the Networks
  5. Vulnerabilities Associated with Systems
  6. Exploring Malware Threats and Their Countermeasures
  7. Enumeration: Listing the System/Users and Connecting Them
  8. Gaining Access to Systems: Hacking
  9. Monitoring and Capturing Data Packets Using Sniffing
  10. Restricting the System Access: Denial of Service (DoS) Attack
  11. Tricking People to Gather Confidential Information: Social Engineering
EH2
  1. Web Servers and Threats Associated with It
  2. Web Applications and Threats Associated with It
  3. Controlling User Session with Authenticated TCP Connection: Session Hijacking
  4. Injecting Code in Data Driven Applications: SQL Injection
  5. Hacking Mobile Platforms and Threats Associated with It
  6. Encrypting and Decrypting the Code: Cryptography and Its Types
  7. Evading IDS, Firewalls and Honeypots
  8. Wireless Networks and Threats Associated with It
  9. Cloud Computing, Virtualisation and Threats Associated with It
  10. Output Analysis and Reports
  11. Economics and Laws: Passwords and Encryption

Appendix A: Exploring Artificial Intelligence and Machine Learning
Appendix B Internet of Things and Security

Labs - 1

Lab Session 1 - Gathering Information about target Computer Systems - Footprinting and Investigation
Lab Session 2 - Scanning Computers in the Networks
Lab Session 3 - Exploring Malware Threats and Their
Lab Session 4 - Enumeration- Listing the Systems/Users and Connecting Them
Lab Session 5 - Gaining Access to the Systems - Hacking
Lab Session 6 - Monitoring and Capturing Data Packets Using Sniffing
Lab Session 7 - Restricting the System Access - Denial of Service (DoS Attack)

Labs - 2

Lab Session 8 - Tricking People to Gather Confidential Information - Social Engineering
Lab Session 9 - Web Servers and Threats Associated with It
Lab Session 10 - Web Applications and Threats Associated with It
Lab Session 11 - Controlling User Session with Authenticated TCP Connection - Session
Lab Session 12 - Injecting Code in Data Driven Applications: SQL Injection
Lab Session 13 - Hacking Mobile Platforms
Lab Session 14 - Encrypting and Decrypting the Code–Cryptography and Its Types
Lab Session 15 - Evading IDS, Firewalls and Honeybots
Lab Session 16 - Wireless networks and Threats Associated with It
Lab Session 17 - Cloud Computing, Virtualisation and Threats Associated with It
Lab Session 18 - Output Analysis and Report

Exam Details


Exam Codes Ethical Hacking Expert S09-006 (Academy customers use the same codes)
Number of Questions 90
Type of questions Multiple Choice
Length of Test 180 mins
Passing Score 70%
Recommended Experience Who is interested to making their carrier in Ethical Hacking / Cyber Security
and passionate except every challenge of IT industry / technologies ,
Security officer, Security Professionals, Site Administrator, Integrity of
network infrastructure .
Languages English
Registration link Closed