/Introduction to Ethical Hacking

Provided by: Northumbria University

Course Area: North East

Course Code: NUCC-EH

Course Type: Short Course

Start date: 20/01/2020

End date: 12/04/2020

Subjects: Cyber Security, Ethical Hacking, Networks and Security

Price: Free

Delivery Method: Face to face

Introduction to Ethical Hacking

  • Basic of Ethical Hacking – What are the phases, How to setup the Virtual environment, identify IP address, Virtual Networking, Introduction to Kali, Introduction to hacking terminologies
  • Introduction to Footprinting – Nikto, Harvester, Shodan, Google hacking
  • Introduction to Scanning and Enumeration –Identify live systems using hping 3 and nmap, Identify open ports using hping 3 and nmap, Performing half connect scan, SYN scan using hping3 and nmap
  • Introduction to Maltego and Vulnerability assessment tools
  • Mapping Networks – Using Zenmap, Banner Grabbing using Nmap and Netcat, Enumeration using nslookup, Enumeration using dig, Enumeration using psinfo
  • Introduction to BurpSuite and Metasploit
  • Packet Sniffing with Wireshark, Mac Spoofing with SMAC, Man in the Middle Attack
  • Social Engineering and Demo
  • ARP poisoning and Session Hijacking, Capturing User Credentials, Password Cracking,
  • How to plant a backdoor – Hands on Exercise, Malware analysis using Stinger, Install and use Hash calc for malware analysis

Who is this course for?

This course is suitable for undergraduate students who are already enrolled in Northumbria CIS degree programs.

What will I learn

  • Learn the business and technical logistics behind penetration testing
  • Identify evolving threats from different types of hackers
  • Reveal shocking truths about the information operating systems can divulge
  • Realize the power of footprinting on the Internet
  • Detect live systems by inference
  • Get by a step-by-step, no-nonsense introduction to cryptography
  • Identify differences between vulnerability assessments and penetration tests
  • Master ways to prevent and disable system hacking
  • Protect yourself from malware, including Trojans, backdoor, viruses, and more
  • Thwart hackers attacking wireless networks and mobile devices
  • Understand the pros and cons of intrusion detection systems, intrusion prevention system, and web application firewalls
  • Implement countermeasures to stop SQL injections and other database attacks
Visit this course

</Keep in touch>