Cyber Security (Ethical Hacking Using Kali Linux)

by Web Learning Resources Claim Listing

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

S$400

Contact the Institutes

Fill this form

Advertisement

Web Learning Resources Logo

img Duration

8 Hours

Course Details

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

 

Course Content:

  • Introduction to Ethical Hacking
  • Types of Hackers and Famous Hackers in the world
  • Terminologies associated with Hacking
  • What do you need to have to hack a system?
  • Hacking tools
  • Skills of a hacker
  • What are the different phases in hacking?
  • About to hack a System – what all information needed from a system?
  • Reconnaissance, Enumeration
  • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
  • Exercise – Setting up the system – Kali Linux
  • Exercise – Nmap, port scanning
  • Monitor and capture target system data
  • Sniffing and sniffing tools
  • ARP Poisoning and ARP spoofing
  • Exercise – ARP poisoning
  • DNS Poisoning and tools
  • Exercise – DNS Poisoning
  • How to take control over a system (Exploitation)? Tool: Metasploit
  • Exercise – Using Metasloit
  • Ways of attacking a system
  • Trojan Attacks
  • TCP/IP Hijacking – Shijack, Hunt
  • Exercise – Hunt
  • Email Hijacking and inserting viruses in the system
  • Exercise – Email spoofing
  • Password Hacking – Hydra, Crunch, Rainbow tables
  • Exercise – Crunch
  • Wireless Hacking – Kismet, NetStumbler, WEPcrack
  • Exercise – NetStumbler
  • Social Engineering attacks and different scenarios
  • DDOS Attacks, Protocol Attacks,
  • Cross Site Scripting and XSS Attacks
  • SQL Injection, SQLMAP, SQLNinja, JSQL injection
  • Exercise – SQL Injection
  • Penetration Testing
  • Exercise – XSS Attack

 

  • Bukit Merah Branch

    1093 Lower Delta Road, Bukit Merah, Central

Check out more Cybersecurity courses in Singapore

ICDL Foundation Logo

Cyber Security

Successful candidates will be able to apply good IT security principles to manage connections, devices, and data effectively and safely. After passing this module, candidates will feel confident keeping information and data secure.

by ICDL Foundation [Claim Listing ]
COMAT Logo

Securing Email with Cisco Email Security Appliance (SESA)

This hands-on course provides you with the knowledge and skills to implement, troubleshoot, and administer Cisco Email Security Appliance, including key capabilities such as advanced malware protection, spam blocking, anti-virus protection, outbreak filtering, encryption, quarantines, and data loss

by COMAT [Claim Listing ]
NTUC LearningHub Logo

ISACA Cybersecurity Fundamentals

This 15-session course introduces you to cybersecurity, a growing and rapidly changing field that is becoming increasingly vital to business survival, job stability, and national security.

by NTUC LearningHub [Claim Listing ]
  • Price
  • Start Date
  • Duration
AgileAsia Logo

Certified Information Security Manager (CISM)

CISM (Certified Information Security Manager) is an advanced certification that indicates that an individual possesses the knowledge and experience required to develop and manage an enterprise information security (infosec) program.

by AgileAsia [Claim Listing ]
BlockCyber Pte Ltd Logo

Cyber Security Training

SANS is the most trusted and the largest source for cyber security training in the world. Our courses are developed by industry leaders in numerous fields including penetration testing, network security, forensics, audit, security leadership, and application security. 

by BlockCyber Pte Ltd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy