Cyber Security (Ethical Hacking Using Kali Linux)

by Web Learning Resources Claim Listing

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

$400

Contact the Institutes

Fill this form

Advertisement

Web Learning Resources Logo

img Duration

8 Hours

Course Details

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

 

Course Content:

  • Introduction to Ethical Hacking
  • Types of Hackers and Famous Hackers in the world
  • Terminologies associated with Hacking
  • What do you need to have to hack a system?
  • Hacking tools
  • Skills of a hacker
  • What are the different phases in hacking?
  • About to hack a System – what all information needed from a system?
  • Reconnaissance, Enumeration
  • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
  • Exercise – Setting up the system – Kali Linux
  • Exercise – Nmap, port scanning
  • Monitor and capture target system data
  • Sniffing and sniffing tools
  • ARP Poisoning and ARP spoofing
  • Exercise – ARP poisoning
  • DNS Poisoning and tools
  • Exercise – DNS Poisoning
  • How to take control over a system (Exploitation)? Tool: Metasploit
  • Exercise – Using Metasloit
  • Ways of attacking a system
  • Trojan Attacks
  • TCP/IP Hijacking – Shijack, Hunt
  • Exercise – Hunt
  • Email Hijacking and inserting viruses in the system
  • Exercise – Email spoofing
  • Password Hacking – Hydra, Crunch, Rainbow tables
  • Exercise – Crunch
  • Wireless Hacking – Kismet, NetStumbler, WEPcrack
  • Exercise – NetStumbler
  • Social Engineering attacks and different scenarios
  • DDOS Attacks, Protocol Attacks,
  • Cross Site Scripting and XSS Attacks
  • SQL Injection, SQLMAP, SQLNinja, JSQL injection
  • Exercise – SQL Injection
  • Penetration Testing
  • Exercise – XSS Attack

 

  • Bukit Merah Branch

    1093 Lower Delta Road, Bukit Merah, Central

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy