Cyber Security (Ethical Hacking Using Kali Linux)

by Web Learning Resources Claim Listing

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

S$400

Contact the Institutes

Fill this form

Advertisement

Web Learning Resources Logo

img Duration

8 Hours

Course Details

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

 

Course Content:

  • Introduction to Ethical Hacking
  • Types of Hackers and Famous Hackers in the world
  • Terminologies associated with Hacking
  • What do you need to have to hack a system?
  • Hacking tools
  • Skills of a hacker
  • What are the different phases in hacking?
  • About to hack a System – what all information needed from a system?
  • Reconnaissance, Enumeration
  • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
  • Exercise – Setting up the system – Kali Linux
  • Exercise – Nmap, port scanning
  • Monitor and capture target system data
  • Sniffing and sniffing tools
  • ARP Poisoning and ARP spoofing
  • Exercise – ARP poisoning
  • DNS Poisoning and tools
  • Exercise – DNS Poisoning
  • How to take control over a system (Exploitation)? Tool: Metasploit
  • Exercise – Using Metasloit
  • Ways of attacking a system
  • Trojan Attacks
  • TCP/IP Hijacking – Shijack, Hunt
  • Exercise – Hunt
  • Email Hijacking and inserting viruses in the system
  • Exercise – Email spoofing
  • Password Hacking – Hydra, Crunch, Rainbow tables
  • Exercise – Crunch
  • Wireless Hacking – Kismet, NetStumbler, WEPcrack
  • Exercise – NetStumbler
  • Social Engineering attacks and different scenarios
  • DDOS Attacks, Protocol Attacks,
  • Cross Site Scripting and XSS Attacks
  • SQL Injection, SQLMAP, SQLNinja, JSQL injection
  • Exercise – SQL Injection
  • Penetration Testing
  • Exercise – XSS Attack

 

  • Bukit Merah Branch

    1093 Lower Delta Road, Bukit Merah, Central

Check out more Cybersecurity courses in Singapore

Sapience Consulting Pte Ltd Logo

Certified Information Systems Security Professional (CISSP)

5-day CISSP exam preparation course is designed to help those intending to obtain the CISSP certification, which is becoming a must-have certification in CyberSecurity.

by Sapience Consulting Pte Ltd [Claim Listing ]
Avantus Training Logo

CT-Security+ | CompTIA Security+

This course is targeted toward the information technology (IT) professional who has networking and administrative skills in Windows®-based Transmission Control Protocol/Internet Protocol (TCP/IP) networks; familiarity with other operating systems, such as macOS®

by Avantus Training [Claim Listing ]
Koenig-Solutions Logo

Advanced Network Training Course

Advanced Network Training Certification is a powerful affirmation of an individual's proficiency in managing, designing, and overseeing advanced network systems.

by Koenig-Solutions [Claim Listing ]
  • Price
  • Start Date
  • Duration
Sapience Consulting Pte Ltd Logo

Certified in Risk and Information System Controls (CRISC)

Implement and align effective risk management and control frameworks with your enterprise’s business goals. In today’s business environment, enterprises need to innovate in order to survive and flourish. Innovation, however, almost always involves risk.

by Sapience Consulting Pte Ltd [Claim Listing ]
Cybiant Logo

Certified in Risk and Information Systems Control (CRISC)

ISACA’s Certified in Risk and Information Systems Control (CRISC®) certification is ideal for mid-career professionals engaged in enterprise risk management and control.

by Cybiant [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy