Ethical Hacking & Penetration Testing (Module #2) - Social Engineering and Trojans

Course

Online

Save 41%
Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Class hours

    5h

  • Start date

    Different dates available

In this series of Ethical Hacking & Penetration Testing, you will learn about Nmap and ZenMap, The Harvester, WHOIS and dnsenum, Urlcrazy and dnsdict6, Dnsrecon, Dnsmapping, Introduction, Types of Social Engineering, Social Engineering attacks, Spear-phishing Attack, Phishing Attack, Mass mailer Attack         

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Step 1 - eduCBA sends the redemption coupon along with the registration link.
Step 2 - Student will register with his register email id and coupon Step 3 - Student receive the course access and password on his/her email id
Step 4 - Login using your email id and password and start learning

Printable Certificate

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Testing
  • Linux
  • Hacking
  • Engineering
  • Programming & Data

Course programme

Kali Linux, previously known as Backtrack was founded in 2006.
It became famous with Backtrack 5, the most popular pentesting live CD.
Later, it was relaunched with Kali Linux 1.
0, and now officially as Kali Linux 2.
0 Sana in 2015 with even GNOME 3 user interface.
Kali Linux is developed and maintained by Offensive security pvt.
Ltd.
Through this course you will learn about Nmap and ZenMap, The Harvester, WHOIS and dnsenum, Urlcrazy and dnsdict6, Dnsrecon, Dnsmapping, Introduction, Types of Social Engineering, Social Engineering attacks, Spear-phishing Attack, Phishing Attack, Mass mailer Attack, Types of Computer Malwares, Dangerous viruses of all time, Installing Rootkit Hunter, command prompt backdoor, Backdoor – Gaining Access, Backdoor – Maintaining Access.

Additional information

Lifetime Validity

Ethical Hacking & Penetration Testing (Module #2) - Social Engineering and Trojans

Price on request