Course Report
Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.
Visit Course Report
Course Features
Duration
3 days
Delivery Method
Online
Available on
Limited Access
Accessibility
Desktop, Laptop
Language
English
Subtitles
English
Level
Intermediate
Teaching Type
Instructor Paced
Video Content
12 hours
Course Description
Course Overview
Live Class
Human Interaction
Personlized Teaching
International Faculty
Case Based Learning
Post Course Interactions
Case Studies,Instructor-Moderated Discussions
Skills You Will Gain
Prerequisites/Requirements
Course participants should have a basic understanding of cybersecurity and networking concepts.
The following Learning Path provides a great overview of cybersecurity fundamentals and ethical hacking concepts that are prerequisites for this course: https://learning.oreilly.com/learning-paths/learning-path-cybersecurity/9780135255483/
What You Will Learn
Buffer Overflows
Evasion and Post Exploitation Techniques
Hacking Databases
Hacking Networking Devices
Hacking User Credentials
Hacking Web Applications
How to Maintain Persistence, Pivoting, and Data Exfiltration
Penetration testing Linux distributions such as Kali Linux, Parrot, Black Arch and others
Performing Passive and Active Reconnaissance
Performing Vulnerability Scanning
Social Engineering
Wireless Hacking
