Course Features
Duration
3 days
Delivery Method
Online
Available on
Limited Access
Accessibility
Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Teaching Type
Instructor Paced
Video Content
12 hours
Course Description
Course Overview
Live Class
Human Interaction
Personlized Teaching
International Faculty
Case Based Learning
Post Course Interactions
Case Studies,Instructor-Moderated Discussions
Skills You Will Gain
Prerequisites/Requirements
Course participants should have a basic understanding of cybersecurity and networking concepts.
The following Learning Path provides a great overview of cybersecurity fundamentals and ethical hacking concepts that are prerequisites for this course: https://learning.oreilly.com/learning-paths/learning-path-cybersecurity/9780135255483/
What You Will Learn
Buffer Overflows
Evasion and Post Exploitation Techniques
Hacking Databases
Hacking Networking Devices
Hacking User Credentials
Hacking Web Applications
How to Maintain Persistence, Pivoting, and Data Exfiltration
Penetration testing Linux distributions such as Kali Linux, Parrot, Black Arch and others
Performing Passive and Active Reconnaissance
Performing Vulnerability Scanning
Social Engineering
Wireless Hacking
