Becoming a Certified Ethical Hacker is a challenging but rewarding journey. The Ethical Hacker Certification course will help you develop in-demand skills in the field of network security, giving you the knowledge and skills to identify and mitigate vulnerabilities in computer systems.
By enrolling in this course, you’ll learn about reconnaissance including protocols, attacking web technologies, pen testing wireless networks, Windows hacking, and more. You’ll also understand and identify weaknesses and vulnerabilities in target systems and use the knowledge to assess the security aspect efficiently.
A variety of topics also included in this course including DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows.
Method of Assessment:
Upon conclusion of the course, there’s an online multiple-choice quiz assessment, which will determine whether you have passed the course. The test is marked immediately and results are published instantly (60% pass mark).
Certification:
Enhance your profile with a CPD-accredited certificate, available for an additional cost after course completion.
Requirements
There are no academic entry requirements for this course, and it is open to students of all academic backgrounds.
Course Curriculum
Overview | |||
Overview | FREE | 00:35:00 | |
Reconnaissance | |||
Reconnaissance | FREE | 00:25:00 | |
Protocols | |||
Protocols | 01:25:00 | ||
Windows Hacking | |||
Windows Hacking | 01:19:00 | ||
Attacking Web Technologies | |||
Attacking Web Technologies | 00:56:00 | ||
Pen Testing Wireless Networks | |||
Pen Testing Wireless Networks | 01:34:00 | ||
Security Fundamentals | |||
Security Fundamentals | FREE | 00:51:00 | |
Access Controls | |||
Access Controls | 00:33:00 | ||
Protocols | |||
Protocols | 00:36:00 | ||
Cryptography | |||
Cryptography | 00:52:00 | ||
Why Vulnerability Assessments? | |||
Why Vulnerability Assessments? | 00:36:00 | ||
Vulnerability Tools of the Trade | |||
Vulnerability Tools of the Trade | 00:10:00 | ||
Output Analysis and Reports | |||
Output Analysis and Reports | 00:13:00 | ||
Reconnaisance, Enumeration and Scanning | |||
Reconnaisance, Enumeration and Scanning | 00:51:00 | ||
Gaining Access | |||
Gaining Access | 00:31:00 | ||
Maintaining Access | |||
Maintaining Access | 00:17:00 | ||
Covering Tracks | |||
Covering Tracks | 00:18:00 | ||
Malware | |||
Malware | 00:28:00 | ||
Buffer Overflows | |||
Buffer Overflows | 00:22:00 | ||
Password Cracking | |||
Password Cracking | 00:33:00 | ||
Mock Exam | |||
Mock Exam – Ethical Hacker Certification Course | 00:20:00 | ||
Final Exam | |||
Final Exam – Ethical Hacker Certification Course | 00:20:00 |
Course Reviews
No Reviews found for this course.