Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Diploma in Ethical Hacking

Course Cover
compare button icon

Course Features

icon

Duration

15 hours

icon

Delivery Method

Online

icon

Available on

Limited Access

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Advanced

icon

Teaching Type

Self Paced

icon

Video Content

15 hours

Course Description

This course will begin by introducing you to ethical hacking and basic concepts of networking. You will learn about the roles of an ethical hacker, penetration testing methodologies like tiger box and white box models.  You will learn about the TCP/IP stack, types of computer network, IP addressing, TCP, UDP and IP subnetting. It takes knowledge of network and computer technology to be a security tester otherwise known as an ethical hacker. The course then explains the different routing protocols like Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). You will learn about IP version 4 and IP version 6, which happens to be the latest IP version. Next, you will see a live demonstration of how a lab is set up for ethical hacking and also how to install and use Nessus for vulnerability scanning. You will gain an understanding of how real hackers think and attack innocent victims' computer systems. Finally, you will learn about social engineering attack, man in the middle attack, basic concepts of cryptography, cryptographic hash functions, digital certificate and digital signature. You will also learn some security attacks on systems through malwares, phishing, password cracking, DDoS and Dos. You will then move on to learn about the measures taken to secure information from attackers or hackers through the use of biometrics and steganography and also perform network analysis using Wireshark. Start this course today, and learn valuable skills in ethical hacking.

Course Overview

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

Skills You Will Gain

What You Will Learn

Compare ethical hacking and penetration testing

Describe black box testing, physical probing, reverse engineering and side-channel analysis

Describe man-in-the-middle attack using the concept of sniffing via ARP poisoning

Discuss some of the security issues in Domain Name System (DNS) server and email systems

Explain five password cracking techniques

Explain how network scan, port scan and vulnerability scan work

Explain how the SHA-512 Compression function works

Explain how to use Metasploit for penetration into Windows and Linux operating systems

Explain the meaning of the term "Social Engineering"

Outline the general defence guidelines against DoS and DDoS attack

Outline the meaning of plaintext, password hashing and password hash salting

Course Cover