Cyber Security (Ethical Hacking Using Kali Linux)

by Web Learning Resources Claim Listing

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

S$400

Contact the Institutes

Fill this form

Advertisement

Web Learning Resources Logo

img Duration

8 Hours

Course Details

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

 

Course Content:

  • Introduction to Ethical Hacking
  • Types of Hackers and Famous Hackers in the world
  • Terminologies associated with Hacking
  • What do you need to have to hack a system?
  • Hacking tools
  • Skills of a hacker
  • What are the different phases in hacking?
  • About to hack a System – what all information needed from a system?
  • Reconnaissance, Enumeration
  • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
  • Exercise – Setting up the system – Kali Linux
  • Exercise – Nmap, port scanning
  • Monitor and capture target system data
  • Sniffing and sniffing tools
  • ARP Poisoning and ARP spoofing
  • Exercise – ARP poisoning
  • DNS Poisoning and tools
  • Exercise – DNS Poisoning
  • How to take control over a system (Exploitation)? Tool: Metasploit
  • Exercise – Using Metasloit
  • Ways of attacking a system
  • Trojan Attacks
  • TCP/IP Hijacking – Shijack, Hunt
  • Exercise – Hunt
  • Email Hijacking and inserting viruses in the system
  • Exercise – Email spoofing
  • Password Hacking – Hydra, Crunch, Rainbow tables
  • Exercise – Crunch
  • Wireless Hacking – Kismet, NetStumbler, WEPcrack
  • Exercise – NetStumbler
  • Social Engineering attacks and different scenarios
  • DDOS Attacks, Protocol Attacks,
  • Cross Site Scripting and XSS Attacks
  • SQL Injection, SQLMAP, SQLNinja, JSQL injection
  • Exercise – SQL Injection
  • Penetration Testing
  • Exercise – XSS Attack

 

  • Bukit Merah Branch

    1093 Lower Delta Road, Bukit Merah, Central

Check out more Cybersecurity courses in Singapore

SMU Academy Logo

Advanced Cyber Risk Management

As organisations embrace digitalisation to transform business and operations, it is critical to develop policies, procedures and controls to manage technology-related risks. The frequency and scale of cyber attacks and breaches have escalated.

by SMU Academy [Claim Listing ]
FirstCom Academy Logo

Cyber Security Course

Understand the importance of cybersecurity and common cybersecurity terminology

by FirstCom Academy [Claim Listing ]
Boston Business School Logo

Cyber Security Awareness Essentials

The course is designed to help learners identify cybersecurity risks and threats and best practices to protect personal and business information from cybersecurity threats

by Boston Business School [Claim Listing ]
  • Price
  • Start Date
  • Duration
SUSS Singapore University Of Social Sciences Logo

Introduction To Cybersecurity (CET102)

In this digital world, we all have a responsibility to protect ourselves and the people we interact with. This all starts with understanding cybersecurity.

by SUSS Singapore University Of Social Sciences [Claim Listing ]
Tertiary Courses Logo

Cyber Security Course (Basic)

Cyber Security is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

by Tertiary Courses [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy