2015
Cybrary
Tom Clancy
13 hrs 26 mins
English
As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable ethical hackers is a global need. Ethical hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system. They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from completing Penetration Testing and Ethical Hacking training here on Cybrary. You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Learning objectives include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. At the conclusion of this training class, you’ll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system.
Module 01 - Phases of Penetration Testing
Module 02 - Footprinting
Module 03 - Scanning
Module 04 - Enumeration
Module 05 - System Hacking
Module 06 - Trojans
Module 07 - Viruses & Worms
Module 08 - Sniffing Traffic
Module 09 - Social Engineering
Module 10 - Denial of Service
Module 11 - Session Hijacking
Module 12 - Hacking Web Servers
Module 13 - Web Applications
Module 14 - SQL Injection
Module 15 - Wireless
Module 16 - Mobile Hacking
Module 17 - IDS, Firewalls & Honeypots
Module 18 - Buffer Overflows
Module 19 - Cryptography
www.cybrary.it/course/ethical-hacking/
Download File Size:2.36 GB