Ethical hacking is becoming a popular skill for IT operations personnel to have, and an important check mark for many IT ops positions. By taking the “attacker’s perspective,” it becomes easier to see the weaknesses in your own environment, and to start shoring up those environments.
The Ethical Hacking course through IPCEICT will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems.
-
Course Outline
- Installation of Kali Linux OS
- Basic usage of Linux
- Information gathering
- Metasploit framework
- Exploiting a vulnerability with Metasploit framework
- Making trojan file
- Capturing network traffics
- Data mining from captured network traffics
- Arp poisoning attack
- Dns spoof attack
- SQL injection
- Command injection
- Cross-site Scripting (XSS)
- Denial of service attack
0.0
0 total
5
4
3
2
1