Ethical Hacking

Cyber Security Training

Course Overview

When you you invest your money and time in this course You will have the ability to do ethical hacking including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics & tools in a continuous development

Spread the love

Course Outline

  • Information Security Overview
  • Why learn Ethical Hacking
  • Reconnaissance methodology
  • Foot printing Concepts
  • Network Scanning
  • categorize & Tracking
  • Systems Attacks
  • Malware ,virus , worms
  • DDoS Attack
  • Social Engineering
  • Network Sniffing
  • Hijacking
  • Web applications attacks
  • SQL Injection
  • Network Hacking
  • Wireless Hacking
  • Mobile Hacking
  • Cloud Security
  • Hacking Firewall
  • Cryptography
  • Course ID: Ethical Hacking
  • Duration: 48 Hours
Download Course Outline
Course

Name

Email Address

Phone Number:

Jump to Course: