All in One Offer! | Access Unlimited Courses in any category starting at just $29. Signup today. Offer Ends in: 6 Days!

Browse Library

Get Unlimited Learning Access
$29
6 days left at this price!
30-Day Money-Back Guarantee

It Includes

  • Get Full Access to the platform
  • Access to 16000+ online courses
  • Play & Pause Course Viewing
  • Attend weekly live webinar
  • High Quality Recorded Lectures
  • Learn Online from Mobile/PC/Tablet
  • Assignments & Projects
  • Online iLab Access
  • Certificate of Completion
  • Download for offline viewing
  • Cancel Anytime
$29
  • Ethical Hacking and Penetration Testing

OVERVIEW

Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.

Objective

In this course, you will learn:

  • Overview of Information and Cyber Security

  • Hacking and Ethical Hacking concepts

  • Five Phases of Hacking

  • Using tools for scanning and Vulnerability Assessment

  • Malware based Attacks

  • Man-in-the-Middle Attack

  • VAPT of Web Servers and Web Application Servers

  • Wireless Hacking

Target Audience

This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.

Prerequisites

  • For taking this course, knowledge about Networking Basics and Servers will be an essential.

  • Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.

  • Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.

Module 1 : Introduction to Information Security

  • Information Security Overview

  • Hacking and Ethical Concepts

  • Hacking Phases

  • Information Security Controls

  • Penetration Testing Overview

Module 02 : Footprinting

  • Footprinting Concepts

  • Footprinting through Search Engines

  • Footprinting through Web Services

  • Footprinting through Social Networking Sites

Module 03: Scanning Networks 

  • Understanding TCP Flags

  • Network Scanning Concepts

  • Scanning Techniques

  • Scanning Devices

Module 04: Enumeration

  • Enumeration Concepts

  • Enumeration Methods and Tools

Module 05: Vulnerability Assessment

  • Vulnerability Assessment Concepts

  • Vulnerability Assessment Solutions

  • Vulnerability Scoring Systems

  • Vulnerability Assessment Tools

  • Vulnerability Assessment Reports

Module 06: System Hacking

  • System Hacking Concepts

  • Cracking Passwords

  • Escalating Privileges

  • Executing Applications

  • Hiding Files

  • Covering Tracks

Module 07: Malware Threats

  • Malware Concepts

  • Trojan Concepts

  • Virus and Worm Concepts

  • Malware Analysis

  • Countermeasures

  • Anti-Malware Software

Module 08: Sniffing

  • Sniffing Concepts

  • Sniffing Technique: MAC Attacks

  • Sniffing Technique: DHCP Attacks

  • Sniffing Technique: ARP Poisoning

  • Sniffing Technique: Spoofing Attacks

  • Sniffing Technique: DNS Poisoning

Module 09: Web Servers/Application VAPT

  • Web Server/Application Assessment Methodology

  • Web Server/Application Assessment Tools

  • Web Server/Application VAPT and Reporting

Module 10: Wireless Network VAPT

  • Wi-Fi Authentication Modes

  • Wireless Encryption Protocols

  • Wireless Network VAPT and Reporting

  • Kali VM, Windows 10 VM and Windows Server VM
  • Anyone who is willing to move into Information Security
View More...
  • Section 1 : Introduction 4 Lectures 00:11:56

    • Lecture 1 :
    • Introduction to Ethical Hacking Preview
    • Lecture 2 :
    • CIA
    • Lecture 3 :
    • Hacking Phases
    • Lecture 4 :
    • Bug Bounty Program
  • Section 2 : Reconnaissance 3 Lectures 00:05:54

    • Lecture 1 :
    • Reconnaissance Introduction
    • Lecture 2 :
    • Footprinting
    • Lecture 3 :
    • Footprinting Demo
  • Section 3 : Scanning 7 Lectures 00:16:21

    • Lecture 1 :
    • Scanning
    • Lecture 2 :
    • Network Discovery
    • Lecture 3 :
    • Port Scanning using NMAP
    • Lecture 4 :
    • Capturing and Analyzing Packets using Wireshark
    • Lecture 5 :
    • Understand TCP Flags
    • Lecture 6 :
    • Scanning beyond IDS and Firewall
    • Lecture 7 :
    • Idle Scan or Zombie Scan
  • Section 4 : Vulnerability Scanning 3 Lectures 00:16:35

    • Lecture 1 :
    • Introduction to Vulnerability Scanning
    • Lecture 2 :
    • Vulnerability Scanning Demo
    • Lecture 3 :
    • Vulnerability Scanning Using Nessus
  • Section 5 : Gaining Access 3 Lectures

    • Lecture 1 :
    • Gaining Access
    • Lecture 2 :
    • Gaining Access to Windows 10 System
    • Lecture 3 :
    • Privilege Escalation
  • Section 6 : Maintaining Access 2 Lectures

    • Lecture 1 :
    • Maintaining Access
    • Lecture 2 :
    • Clearing Tracks
  • Section 7 : Malware 3 Lectures 00:13:06

    • Lecture 1 :
    • Malware
    • Lecture 2 :
    • Malware Demo
    • Lecture 3 :
    • Using Crypter to Keep Malware Undetected by Antivirus
  • Section 8 : Sniffing 5 Lectures 00:18:32

    • Lecture 1 :
    • Sniffing
    • Lecture 2 :
    • MAC Flooding
    • Lecture 3 :
    • DHCP Attacks
    • Lecture 4 :
    • DNS Attacks
    • Lecture 5 :
    • ARP Poisoning
  • Section 9 : Web Server Attacks 5 Lectures 00:27:50

    • Lecture 1 :
    • Web Server Attacks
    • Lecture 2 :
    • DDoS Attack
    • Lecture 3 :
    • Phishing Attack
    • Lecture 4 :
    • SSH Brute Force Attack
    • Lecture 5 :
    • Web Application Attack
  • Section 10 : Wireless Network Attack 2 Lectures 00:11:39

    • Lecture 1 :
    • Understand Wireless Network Authentication and Encryption
    • Lecture 2 :
    • Wireless Network Attack
  • How do i access the course after purchase?

    It's simple. When you sign up, you'll immediately have unlimited viewing of thousands of expert courses, paths to guide your learning, tools to measure your skills and hands-on resources like exercise files. There’s no limit on what you can learn and you can cancel at any time.
  • Are these video based online self-learning courses?

    Yes. All of the courses comes with online video based lectures created by certified instructors. Instructors have crafted these courses with a blend of high quality interactive videos, lectures, quizzes & real world projects to give you an indepth knowledge about the topic.
  • Can i play & pause the course as per my convenience?

    Yes absolutely & thats one of the advantage of self-paced courses. You can anytime pause or resume the course & come back & forth from one lecture to another lecture, play the videos mulitple times & so on.
  • How do i contact the instructor for any doubts or questions?

    Most of these courses have general questions & answers already covered within the course lectures. However, if you need any further help from the instructor, you can use the inbuilt Chat with Instructor option to send a message to an instructor & they will reply you within 24 hours. You can ask as many questions as you want.
  • Do i need a pc to access the course or can i do it on mobile & tablet as well?

    Brilliant question? Isn't it? You can access the courses on any device like PC, Mobile, Tablet & even on a smart tv. For mobile & a tablet you can download the Learnfly android or an iOS app. If mobile app is not available in your country, you can access the course directly by visting our website, its fully mobile friendly.
  • Do i get any certificate for the courses?

    Yes. Once you complete any course on our platform along with provided assessments by the instructor, you will be eligble to get certificate of course completion.
  • For how long can i access my course on the platform?

    You require an active subscription to access courses on our platform. If your subscription is active, you can access any course on our platform with no restrictions.
  • Is there any free trial?

    Currently, we do not offer any free trial.
  • Can i cancel anytime?

    Yes, you can cancel your subscription at any time. Your subscription will auto-renew until you cancel, but why would you want to?

ILANCHEZHIAN K,

A technocrat with over 21 Years of total experience in INFRASTRUCTURE MANAGEMENT SERVICE with technical expertise in Implementation, Datacenter Operations, Cloud Infrastructure, Cyber Security, Support and Training on most of the industry-standard latest technologies. Certified Ethical Hacker ( CEH ) Computer Hacker Forensic Investigator ( CHFI ) Certified EC-Council Instructor ( CEI ) Citrix Certified Associate ( CCA ) Microsoft Certified System Administrator ( MCSA ) IBM Certified AIX Administrato
View More...
  • learn-nxtgen-hacking-with-technology

    Learn NxtGen Hacking with Technolog...

    By : Gopikrishna C

    Lecture 80 Beginner Level 8:29:27
  • tcp-ip-the-complete-course

    TCP/IP: The Complete Course

    By : Lazaro (Laz) Diaz

    Lecture 17 Beginner Level 1:52:18
  • voip-configuration-and-attacking-hacking

    VoIP Configuration and Attacking (H...

    By : Arpit Mittal

    Lecture 6 Beginner Level 0:10:40
  • cissp-certification-introduction

    CISSP- Certification Introduction

    By : MUKESH SINGH

    Lecture 18 Intermediate Level 2:4:20
  • practical-blockchain-smart-contracts-ethereum-solidity

    Practical Blockchain & Smart Contra...

    By : Abhilash Nelson

    Lecture 40 Beginner Level 4:56:0
  • complete-ethical-hacking-penetration-testing-for-web-apps

    Complete Ethical Hacking & Penetrat...

    By : Abhilash Nelson

    Lecture 30 Beginner Level 3:28:56
Signup & Continue Checkout
By signing up, you agree to our Terms of Use and Privacy Policy
Create New Password
Enter your email address and we'll send you a link to reset your password.