Cyber Security (Ethical Hacking Using Kali Linux)

by Web Learning Resources Claim Listing

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

S$400

Contact the Institutes

Fill this form

Advertisement

Web Learning Resources Logo

img Duration

8 Hours

Course Details

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

 

Course Content:

  • Introduction to Ethical Hacking
  • Types of Hackers and Famous Hackers in the world
  • Terminologies associated with Hacking
  • What do you need to have to hack a system?
  • Hacking tools
  • Skills of a hacker
  • What are the different phases in hacking?
  • About to hack a System – what all information needed from a system?
  • Reconnaissance, Enumeration
  • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
  • Exercise – Setting up the system – Kali Linux
  • Exercise – Nmap, port scanning
  • Monitor and capture target system data
  • Sniffing and sniffing tools
  • ARP Poisoning and ARP spoofing
  • Exercise – ARP poisoning
  • DNS Poisoning and tools
  • Exercise – DNS Poisoning
  • How to take control over a system (Exploitation)? Tool: Metasploit
  • Exercise – Using Metasloit
  • Ways of attacking a system
  • Trojan Attacks
  • TCP/IP Hijacking – Shijack, Hunt
  • Exercise – Hunt
  • Email Hijacking and inserting viruses in the system
  • Exercise – Email spoofing
  • Password Hacking – Hydra, Crunch, Rainbow tables
  • Exercise – Crunch
  • Wireless Hacking – Kismet, NetStumbler, WEPcrack
  • Exercise – NetStumbler
  • Social Engineering attacks and different scenarios
  • DDOS Attacks, Protocol Attacks,
  • Cross Site Scripting and XSS Attacks
  • SQL Injection, SQLMAP, SQLNinja, JSQL injection
  • Exercise – SQL Injection
  • Penetration Testing
  • Exercise – XSS Attack

 

  • Bukit Merah Branch

    1093 Lower Delta Road, Bukit Merah, Central

Check out more Cybersecurity courses in Singapore

Boston Business School Logo

Cyber Security Awareness Essentials

The course is designed to help learners identify cybersecurity risks and threats and best practices to protect personal and business information from cybersecurity threats

by Boston Business School [Claim Listing ]
  • Price
  • Start Date
  • Duration
SUTD Logo

A Primer On Cybersecurity

The objective of this 2-day course is to provide an overview of cybersecurity to a broad audience. We will cover foundational topics but will emphasize examples, applications and techniques to raise awareness on the most fundamental cybersecurity concepts, attack vectors and good practices.

by SUTD [Claim Listing ]
IBF (The Institute Of Banking And Finance Singapore) Logo

Fundamentals Of Cybersecurity, Data Protection And Risk Management

Fundamentals Of Cybersecurity, Data Protection And Risk Management course is offered by IBF (The Institute Of Banking And Finance Singapore). Our mission is to empower financial practitioners with capabilities for a robust Asian financial industry.

by IBF (The Institute Of Banking And Finance Singapore) [Claim Listing ]
  • Price
  • Start Date
  • Duration
Boston Business School Logo

Cyber Security Awareness Essentials

This Course is designed to help learners identify cybersecurity risks and threats and best practices to protect personal and business information from cybersecurity threats.

by Boston Business School [Claim Listing ]
NobleProg (Singapore) Logo

Cybersecurity With Python

This instructor-led, live training in Singapore (online or onsite) is aimed at experienced developers who wish to gain a comprehensive understanding of Python programming and its applications in cybersecurity.

by NobleProg (Singapore) [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy