Ethical Hacking and Penetration Testing Course
Provides skills required to become a Security Professional. More practical demos to understand the theoretical concepts.
Ethical Hacking,Penetration Testing,IT & Software
Lectures -37
Duration -6.5 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Goals
- Overview of Information and Cyber Security
- Hacking and Ethical Hacking concepts
- Five Phases of Hacking
- Using tools for scanning and Vulnerability Assessment
- Malware based Attacks
- Man-in-the-Middle Attack
- VAPT of Web Servers and Web Application Servers
- Wireless Hacking
Prerequisites
- For taking this course, knowledge about Networking Basics and Servers will be an essential.
- Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
- Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
![Ethical Hacking and Penetration Testing Course Ethical Hacking and Penetration Testing Course](https://d3mxt5v3yxgcsr.cloudfront.net/courses/5306/course_5306_image.jpg)
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction to Information Security
4 Lectures
-
Introduction to Ethical Hacking 14:44 14:44
-
CIA 11:56 11:56
-
Hacking Phases 05:11 05:11
-
Bug Bounty Program 10:44 10:44
Reconnaissance
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Scanning Networks
7 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Vulnerability Scanning
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Gaining Access
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Maintaining Access
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Malware
3 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Sniffing
5 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Web Server Attacks
5 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Wireless Network Attack
2 Lectures
![Tutorialspoint](/market/public/assets/images/loader.gif)
Instructor Details
![ILANCHEZHIAN K](https://www.tutorialspoint.com/assets/profiles/376292/profile/200_1847369-1631770640.jpg)
ILANCHEZHIAN K
Course Certificate
Use your certificate to make a career change or to advance in your current career.
![sample Tutorialspoint certificate](/market/public/assets/newDesign/img/primePacks/V-certificate.png)
Our students work
with the Best
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfc bank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
![adobe logo](/market/public/assets/newDesign/img/adobe.png)
![adp logo](/market/public/assets/newDesign/img/adp.png)
![apple logo](/market/public/assets/newDesign/img/apple.png)
![armani logo](/market/public/assets/newDesign/img/armani.jpg)
![bosch logo](/market/public/assets/newDesign/img/bosch.png)
![capegemini logo](/market/public/assets/newDesign/img/capegemini.png)
![cisco logo](/market/public/assets/newDesign/img/cisco.png)
![hdfcbank logo](/market/public/assets/newDesign/img/hdfcbank.png)
![ibm logo](/market/public/assets/newDesign/img/ibm.png)
![intel logo](/market/public/assets/newDesign/img/intel.png)
![mastercard logo](/market/public/assets/newDesign/img/mastercard.png)
![netflix logo](/market/public/assets/newDesign/img/netflix.png)
![qualcomm logo](/market/public/assets/newDesign/img/qualcomm.png)
![samsung logo](/market/public/assets/newDesign/img/samsung.png)
![sony logo](/market/public/assets/newDesign/img/sony.png)
![unilever logo](/market/public/assets/newDesign/img/unilever.png)
![walmart logo](/market/public/assets/newDesign/img/walmart.png)
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now![Annual Membership Annual Membership](/market/public/assets/newDesign/img/membership-large-small.jpg)
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now![Online Certifications Online Certifications](/market/public/assets/newDesign/img/traning-for-a-team.png)