Ethical Hacking Essentials is a first-of-its-kind complimentary MOOC certification that provides foundational knowledge and skills in ethical hacking with add-on labs for hands-on experience. The course contains 12 modules and add-on labs covering fundamental ethical hacking concepts, including emerging technologies like IoT and OT, cloud computing etc.
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
What you will learn
Information Security Fundamentals:
- Information security fundamentals
- Information security laws and regulations
Ethical Hacking Fundamentals:
- Cyber Kill Chain methodology
- Hacking concepts, hacking cycle and different hacker classes
- Ethical hacking concepts, scope and limitations
Information Security Threat & Vulnerabilities:
- Detect various treat sources and vulnerabilities in a network or system
- Different types of malwares
Password Cracking Techniques and Countermeasures:
- Types of password cracking techniques
Social Engineering Techniques and Countermeasures:
- Social engineering concepts
- Insider threats and identify threat concepts
Network- Level Attacks and Countermeasures:
- Packet sniffing concept and types
- Sniffing techniques and countermeasures
- DoS and DDoS attacks under sniffing attacks
Web Application Attacks and Countermeasures
- Web server attacks
- Web application attacks
- Web application architecture and vulnerability stack
- Web application threats and attacks
- SQL injection attacks
- Types of SQL injection attacks
Wireless Attacks and Countermeasures:
- Wireless terminology
- Types of wireless encryption
- Wireless network specific attacks
- Bluetooth attacks
- Wireless attack countermeasures
Mobile Attacks and Countermeasures:
- Mobile attack anatomy
- Mobile attack vectors and mobile platform vulnerabilities
IoT and OT Attacks and Countermeasures:
IoT Attacks:
- IoT devices, their need and application areas
- IoT threats and attacks
OT Attacks:
- Understand OT concepts
- OT challenges and attacks
- OT attacks countermeasures
Cloud Computing Threats and Countermeasures:
- Cloud computing concepts
- Container technology
- Cloud computing threats
- Cloud computing countermeasures
Penetration Testing Fundamentals:
- Fundamentals of penetration testing and it's benefits
- Various types and phases of penetration testing
- Guidelines and recommendations for Penetration testing
Tools you will learn/use:
L0phtCrack, Netcraft, SQL Injection Detection Tool, Web Application Security Scanner, ARP Spoofing Detection Tools