Cyber security – Ethical Hacking using Kali Linux

Cyber-Course-Banner-1000×500-min
08
Oct

Course Objective

Create awareness and understanding about the security on the internet. Acquire fundamental knowledge of cyber security, and the skillsets for network and information systems security. This course is also suitable for beginners who does not have any hacking knowledge.

Course Content

Introduction to Ethical Hacking

Types of Hackers and Famous Hackers in the world

Terminologies associated with Hacking

What do you need to have to hack a system?

Hacking tools

Skills of a hacker

What are the different phases in hacking?

About to hack a System – what all information needed from a system?

Reconnaissance, Enumeration

Footprinting, Fingerprinting, Why to use Kali Linux for hacking?

Exercise – Setting up the system – Kali Linux

Exercise – Nmap, port scanning

Monitor and capture target system data

Sniffing and sniffing tools

ARP Poisoning and ARP spoofing

Exercise – ARP poisoning

DNS Poisoning and tools

Exercise – DNS Poisoning

How to take control over a system (Exploitation)? Tool: Metasploit

Exercise – Using Metasloit

Ways of attacking a system

Trojan Attacks

TCP/IP Hijacking – Shijack, Hunt

Exercise – Hunt

Email Hijacking and inserting viruses in the system

Exercise – Email spoofing

Password Hacking – Hydra, Crunch, Rainbow tables

Exercise – Crunch

Wireless Hacking – Kismet, NetStumbler, WEPcrack

Exercise – NetStumbler

Social Engineering attacks and different scenarios

DDOS Attacks, Protocol Attacks,

Cross Site Scripting and XSS Attacks

SQL Injection, SQLMAP, SQLNinja, JSQL injection

Exercise – SQL Injection

Penetration Testing

Exercise – XSS Attack

 

*Students are advisable to have Basic computer, networking, and security knowledge prior to attend this course.

 

Approved by Ministry of Education Singapore

No upfront payments required. Use Skillsfuture Credits

 

How to Register

Cyber security - Ethical Hacking using Kali Linux

Kindly complete the form below if you wish to register for Cyber security - Ethical Hacking using Kali Linux Course

  • Refreshments are provided

    All training days are from (9.30am - 6.30pm)

    I would like to organize group training

Course Curriculum

Total learning: 28 lessons Time: 8 hours
  •   0/28

    • Introduction to Ethical Hacking
    • Types of Hackers and Famous Hackers in the world
    • Terminologies associated with Hacking
    • What do you need to have to hack a system?
    • Hacking tools
    • Skills of a hacker
    • What are the different phases in hacking?
    • About to hack a System – what all information needed from a system?
    • Reconnaissance, Enumeration
    • Footprinting, Fingerprinting, Why to use Kali Linux for hacking?
    • Exercise – Setting up the system – Kali Linux
    • Exercise – Nmap, port scanning
    • Monitor and capture target system data
    • Sniffing and sniffing tools
    • ARP Poisoning and ARP spoofing
    • DNS Poisoning and tools
    • How to take control over a system (Exploitation)? Tool: Metasploit
    • Ways of attacking a system
    • Trojan Attacks
    • TCP/IP Hijacking – Shijack, Hunt
    • Email Hijacking and inserting viruses in the system
    • Password Hacking – Hydra, Crunch, Rainbow tables
    • Wireless Hacking – Kismet, NetStumbler, WEPcrack
    • Social Engineering attacks and different scenarios
    • DDOS Attacks, Protocol Attacks
    • Cross Site Scripting and XSS Attacks
    • SQL Injection, SQLMAP, SQLNinja, JSQL injection
    • Penetration Testing

Instructors

Web Learning Resources
Course Developer
Web Learning Resources provides high quality training and consultancy services in Singapore. We specialise in empowering your business with the best digital tools to enable effective marketing online.

Review

0.0

0 rating

5 stars
0%
4 stars
0%
3 stars
0%
2 stars
0%
1 star
0%