Certificate in Ethical Hacking
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Class hours
100h
-
Duration
Flexible
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated. In this course, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment.
Facilities
Location
Start date
Start date
About this course
This course has been prepared for professionals aspiring to learn the basics of Ethical Hacking and make a career as an ethical hacker.
A list of Career Paths you can pursue: -
Cyber Security Specialist
Ethical/White Hat Hackers
Security Operations Analyst
Junior Cyber Security Analyst
Senior Cyber Security Analyst
Basic Knowledge of computing and systems.
A CPD certificate of completion will be provided by Graduate School of Management upon successful completion of the online course.
Reviews
Subjects
- Computing
- Hacker
- Hacking
- Environment
- Ethical Hacking
- Tools
- Footprinting
- Reconnaissance
- MIT
- Terminologies
- Hacker Types
- Famous Hackers
Course programme
Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term "Hacker" was originated. In this course, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment.
The Modules included in Ethical Hacking are:-
- Ethical Hacking - Overview
- Ethical Hacking - Hacker Types
- Ethical Hacking - Famous Hackers
- Ethical Hacking - Terminologies
- Ethical Hacking - Tools
- Ethical Hacking - Skills
- Ethical Hacking - Process
- Ethical Hacking - Reconnaissance
- Ethical Hacking - Footprinting
- Ethical Hacking - Fingerprinting
- Ethical Hacking - Sniffing
- Ethical Hacking - Sniffing Tools
- Ethical Hacking - ARP Poisoning
- Ethical Hacking - DNS Poisoning
- Ethical Hacking - Exploitation
- Ethical Hacking - Enumeration
- Ethical Hacking - Metasploit
- Ethical Hacking - Trojan Attacks
- Ethical Hacking - TCP/IP Hijacking
- Ethical Hacking - Email Hijacking
- Ethical Hacking - Password Hacking
- Ethical Hacking - Wireless Hacking
- Ethical Hacking - Social Engineering
- Ethical Hacking - DDOS Attacks
- Ethical Hacking - Cross Site Scripting
- Ethical Hacking - SQL Injection
- Ethical Hacking - Pen Testing
This course has been prepared for professionals aspiring to learn the basics of Ethical Hacking and make a career as an ethical hacker.
Certificate in Ethical Hacking