Ethical Hacking
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
Flexible
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
To be able to perform a successful penetration testing or ethical hacking, first, you have to know all the secrets of your targets. You should find all the systems and network devices of your target network before proceeding an ethical hacking operation.
Facilities
Location
Start date
Start date
Reviews
Subjects
- Network
- Hacking
- Systems
- Network Training
- Open port tester
- System
- Scanning tool
- Network Scanning
- Scanner
- Vulnerabilities
Course programme
This course will supply the secrets of ethical hacking and network discovery, using Nmap. You’ll learn all the details of Nmap, which is the most known and de facto network scanning tool. After downloading and installing Nmap by hands on lessons, you will be able to use it as an ip port scanner, open port tester and checking for devices' operating system and other features.
Learn how to scan the vulnerabilities of the network you discovered by using Nessus. Nessus.
This course starts at beginner levels so you don’t need to have a previous knowledge of network scanning, finding vulnerabilities in devices, using Nmap & using Nessus.
A step by step approach will help you to track your progress on the go and learn needed skills gradually at your own pace. At the end of this course, you will both have a knowledge and a practical skill set about using network scanning, finding vulnerabilities on systems and learning the general competencies of hackers.
Who this course is for:
- Anyone who wants to learn network scan techniques by using Nmap
- Anyone who wants to learn finding vulnerabilities in devices in a network by using Nessus
- Anyone who to learn script scanning in a network
- People who are willing to make a career in Cyber Security
- Cyber Security Consultants who support / will support organisations for creating a more secure environment
- Anyone who wants to be a White Hat Hacker
Ethical Hacking