Course Highlights
  • Understand the basics, types, and legality of hacking, along with key terminologies and elements in cybersecurity.
  • Gain knowledge of footprinting, network scanning, enumeration, and vulnerability assessment techniques.
  • Engage in hands-on demonstrations for information gathering, network scanning, and executing phishing attacks.
  • Learn about various social engineering attacks, their defense strategies, and techniques for web application penetration testing.
Curriculum

17 Topics
Certificate Introduction and Exam Details
Course Introduction
Course Outline
What Is Hacking?
Types of Hackers
Hacking - Legal or Illegal
Introduction to Cyber Security
Stages of Hacking
Terminology in Cyber Security and Hacking
Security Elements in Cyber Security
Penetration Testing
Specialization Introduction
Introduction and Syllabus
Ethical Hacking Fundamentals
Hacking Ethics
Cybersecurity Fundamentals
Evolving Landscape of Cybersecurity and Ethical Hacking

30 Topics
Footprinting or Reconnaissance
DEMO: Gathering Information from Various Online Resources
Types of Footprinting
Website Footprinting
Footprinting Methodology
E-mail Footprinting Methodology
Finding a Company's Public and Restricted Data
Footprinting through Job Sites
Archive.org and Google Dorks
Footprinting Pen Test Process
Introduction to Network Scanning
Identify Targets from System OS
Objectives of Network Scanning
Check for Live System
Network Scanning Tool
DEMO: Networking Scanning with Advanced IP Scanner Tool
Vulnerability Scanning
What Is Enumeration?
Vulnerability Assessment
Scanning Pen Testing
Countermeasures for Port Scanning
DEMO: Port Scanning Using NMAP Tool
Network Footprinting and Security
Footprinting Techniques
Footprinting Methods
Footprinting Tools
Network Scanning
Enumeration and Vulnerability Scanning
Scanning and Pen Testing Strategies
Footprinting and Reconnaissance

32 Topics
Social Engineering
Types of Social Engineering
Human-Based Social Engineering
Phishing
Computer-Based Social Engineering
Mobile-Based Social Engineering
Phases of Social Engineering Attacks
Insider Threats
Common Social Engineering Targets and Defense Strategies
Risk of Social Engineering
DEMO: Manual Phishing Attacks
Tools to Detect Phishing
How to Detect Phishing E-mails?
How to Defend against Phishing Attacks?
DEMO: Phishing Attacks Using Kali Linux Automation Tools
Web Penetration Testing
Web Server Layers
Web Application Attacks
Why Do Web Servers Get Hacked?
Web Servers Architecture
Web Application
Web Application Architecture
DEMO: Bypass Authentication
Social Engineering Terminologies: An Overview
Course Synopsis
Social Engineering and Phishing Attacks
Social Engineering Types
Social Engineering Analysis
Phishing Defense Strategies
Web Penetration Fundamentals
Web Penetration Test
Social Engineering and Web Security

  Write a Review

Ethical Hacking Fundamentals

Go to Free Course