Cyber security – Ethical Hacking using Kali Linux
- 0 (Registered)
Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.
Introduction to Ethical Hacking
Types of Hackers and Famous Hackers in the world
Terminologies associated with Hacking
What do you need to have to hack a system?
Skills of a hacker
What are the different phases in hacking?
About to hack a System – what all information needed from a system?
Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
Exercise – Setting up the system – Kali Linux
Exercise – Nmap, port scanning
Monitor and capture target system data
Sniffing and sniffing tools
ARP Poisoning and ARP spoofing
Exercise – ARP poisoning
DNS Poisoning and tools
Exercise – DNS Poisoning
How to take control over a system (Exploitation)? Tool: Metasploit
Exercise – Using Metasloit
Ways of attacking a system
TCP/IP Hijacking – Shijack, Hunt
Exercise – Hunt
Email Hijacking and inserting viruses in the system
Exercise – Email spoofing
Password Hacking – Hydra, Crunch, Rainbow tables
Exercise – Crunch
Wireless Hacking – Kismet, NetStumbler, WEPcrack
Exercise – NetStumbler
Social Engineering attacks and different scenarios
DDOS Attacks, Protocol Attacks,
Cross Site Scripting and XSS Attacks
SQL Injection, SQLMAP, SQLNinja, JSQL injection
Exercise – SQL Injection
Exercise – XSS Attack
*Students are advisable to have Basic computer, networking, and security knowledge prior to attend this course.
Approved by Ministry of Education Singapore
No upfront payments required. Use Skillsfuture Credits