Cyber security – Ethical Hacking using Kali Linux
![Cyber-Course-Banner-1000×500-min Cyber-Course-Banner-1000×500-min](https://weblearningresources.sg/wp-content/uploads/2018/10/Cyber-Course-Banner-1000x500-min-1000x500.jpg)
- Cyber Security
- 0 (Registered)
-
Introduction to Ethical Hacking
Types of Hackers and Famous Hackers in the world
Terminologies associated with Hacking
What do you need to have to hack a system?
Hacking tools
Skills of a hacker
What are the different phases in hacking?
About to hack a System – what all information needed from a system?
Reconnaissance, Enumeration
Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
Exercise – Setting up the system – Kali Linux
Exercise – Nmap, port scanning
Monitor and capture target system data
Sniffing and sniffing tools
ARP Poisoning and ARP spoofing
Exercise – ARP poisoning
DNS Poisoning and tools
Exercise – DNS Poisoning
How to take control over a system (Exploitation)? Tool: Metasploit
Exercise – Using Metasloit
Ways of attacking a system
Trojan Attacks
TCP/IP Hijacking – Shijack, Hunt
Exercise – Hunt
Email Hijacking and inserting viruses in the system
Exercise – Email spoofing
Password Hacking – Hydra, Crunch, Rainbow tables
Exercise – Crunch
Wireless Hacking – Kismet, NetStumbler, WEPcrack
Exercise – NetStumbler
Social Engineering attacks and different scenarios
DDOS Attacks, Protocol Attacks,
Cross Site Scripting and XSS Attacks
SQL Injection, SQLMAP, SQLNinja, JSQL injection
Exercise – SQL Injection
Penetration Testing
Exercise – XSS Attack
*Students are advisable to have Basic computer, networking, and security knowledge prior to attend this course.
Approved by Ministry of Education Singapore
No upfront payments required. Use Skillsfuture Credits
How to Register
[gravityform id=”14″ title=”true” description=”true”]
- E-mail:
Send an email to [email protected].
Please include your name, contact number and the title of the course you wish to register for.
We will contact you with further details and send you a registration confirmation. - SMS:
Simply send an SMS to+65 9758 1015.
Please include your name, contact number and the title of the course you wish to register for.
We will contact you with further details and send you a registration confirmation. - Phone:
Call us directly at +65 6920 7787 and discuss your interest with one of our consultants.
Course Content
-
Untitled
- Introduction to Ethical Hacking
- Types of Hackers and Famous Hackers in the world
- Terminologies associated with Hacking
- What do you need to have to hack a system?
- Hacking tools
- Skills of a hacker
- What are the different phases in hacking?
- About to hack a System – what all information needed from a system?
- Reconnaissance, Enumeration
- Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
- Exercise – Setting up the system – Kali Linux
- Exercise – Nmap, port scanning
- Monitor and capture target system data
- Sniffing and sniffing tools
- ARP Poisoning and ARP spoofing
- DNS Poisoning and tools
- How to take control over a system (Exploitation)? Tool: Metasploit
- Ways of attacking a system
- Trojan Attacks
- TCP/IP Hijacking – Shijack, Hunt
- Email Hijacking and inserting viruses in the system
- Password Hacking – Hydra, Crunch, Rainbow tables
- Wireless Hacking – Kismet, NetStumbler, WEPcrack
- Social Engineering attacks and different scenarios
- DDOS Attacks, Protocol Attacks
- Cross Site Scripting and XSS Attacks
- SQL Injection, SQLMAP, SQLNinja, JSQL injection
- Penetration Testing