The Cyber Security & Ethical Hacking course is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an endorsed certificate after completing the course. Enrol now for a limited-time discounted price.
Like all the courses of One Education, this Cyber Security & Ethical Hacking is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.
We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support.
Our expert instructors are always available to answer all your questions and make your learning experience exquisite.
After completing the Cyber Security & Ethical Hacking, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.
If you want to learn about this topic and achieve a certificate, you should consider this Cyber Security & Ethical Hacking from One Education.
We are very upfront and clear about all the costs of the course.
The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.
You are taught through a combination of
Endorsed Certificate of Achievement from the Quality Licence Scheme
After successfully completing the course, learners will be able to order an endorsed certificate as proof of their new achievement. Endorsed certificates can be ordered and get delivered to your home by post for only £129. There is an additional £10 postage charge for international students.
CPD Certification from One Education
After successfully completing the assessment of this course, you will qualify for the CPD Certificate from One Education as proof of your continued skill development. Certification is available in PDF format, at the cost of £9, or a hard copy can be sent to you via post, at the cost of £15.
This course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual. One Education will be able to advise you on any further recognition, for example, progression routes into further and/or higher education. For further information, please visit the Learner FAQs on the Quality Licence Scheme website.
To assess your learning, you have to complete the assignment questions provided at the end of the course. You have to score at least 60% to pass the exam and to qualify for Quality Licence Scheme endorsed, and CPD endorsed certificates.
After submitting the assignment, our expert tutor will assess your assignment and will give you feedback on your performance.
After passing the assignment exam, you will be able to apply for a certificate.
Whether you’re an existing practitioner or aspiring expert, this course will enhance your expertise and boost your CV with key skills and an endorsed lesson attesting to your knowledge.
The Cyber Security & Ethical Hacking course is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.
|Introduction to Ethical Hacking|
|VA vs PT and Rule of Engagement||00:09:00|
|Type of Pen Testing||00:06:00|
|Phases of Penetration Test||00:04:00|
|10 Steps to Follow||00:04:00|
|Setting up a Penetration Testing Lab|
|What is Linux OS – Benefits||00:04:00|
|What is Kali Linux||00:03:00|
|Virtual Box Installation||00:06:00|
|Kali Linux Installation in VB||00:12:00|
|Install Metasploitable on Virtual Box||00:09:00|
|Install DVWA in Kali||00:18:00|
|Executing Basic Commands in Kali||00:12:00|
|Executing Advance Commands in Kali||00:14:00|
|What is Information Gathering||00:08:00|
|Maltego Part 1||00:07:00|
|Maltego Part 2||00:06:00|
|Scanning and Enumeration|
|What is Scanning||00:07:00|
|What is Nmap||00:05:00|
|What is Enumeration||00:03:00|
|Types of Enumeration||00:03:00|
|Enumeration Using Hyena – 1||00:07:00|
|Enumeration Using Hyena – 2||00:06:00|
|What is Vulnerability Assessment||00:04:00|
|Phases of Vulnerability Assessment||00:08:00|
|Vulnerability Scoring Systems||00:09:00|
|Introduction to Nessus||00:05:00|
|Create and Configure Nessus Network Policy||00:08:00|
|Nessus Launch Scan and Analyse Result||00:08:00|
|What is IDS||00:11:00|
|What Are Firewalls||00:10:00|
|What is DMZ||00:06:00|
|IDS Evasion Techniques||00:08:00|
|Firewall Evasion Techniques||00:09:00|
|Introduction to Web Servers||00:05:00|
|Types of Web Server Attacks||00:05:00|
|Web Server Penetration Testing||00:04:00|
|Countermeasures of Web Servers?||00:05:00|
|OWASP Top 10 Attacks Part 1||00:05:00|
|OWASP Top 10 Attacks Part 2||00:07:00|
|Website Foot Printing Part 1||00:05:00|
|Website Foot Printing Part 2||00:03:00|
|Command Execution Low||00:06:00|
|Command Execution Medium||00:07:00|
|Configuring Burp Suite||00:16:00|
|File Upload Low||00:10:00|
|File Upload Medium||00:07:00|
|File Upload High||00:08:00|
|SQL Injection II||00:05:00|
|Countermeasures of SQL Injection||00:03:00|
|What Is XSS||00:03:00|
|Types of XSS||00:06:00|
|Countermeasures of XSS||00:04:00|
|What is CSRF||00:06:00|
|What is a Brute Force Attack?||00:05:00|
|Brute Force Political||00:18:00|
|Web Application Penetration Testing?||00:09:00|
|Web Application Countermeasures||00:06:00|
|Denial of Service|
|What is Denial of Service (DOS)?||00:03:00|
|Types of DOS attack?||00:05:00|
|What is a BOTNET?||00:03:00|
|Introduction to Malware||00:09:00|
|Types of Trojans||00:08:00|
|Viruses and Worms||00:07:00|
|Types of Viruses||00:10:00|
|Introduction to Social Engineering||00:05:00|
|Installing BeEF Framework||00:09:00|
|Getting User Credentials Using BeEF Framework||00:11:00|
|Introduction to Cryptography||00:05:00|
|DES and AES||00:06:00|
|RSA and Diffie||00:07:00|
|Public Key Infrastructure (PKI) and Certificate Authority (CA)||00:10:00|
|Transport Layer Security (TLS)||00:04:00|
|Calculating One Way Hashes Using HashCal||00:04:00|
|Basic Data Encryption Advance and Decryption Package||00:05:00|
|Introduction to Report Writing||00:08:00|
|Component of a Report||00:14:00|
|Why we need to fix vulnerabilities||00:05:00|
|Hacker Sponsored Security||00:03:00|
|Key Terms in Bug Bounty Program||00:05:00|
|Bug Bounty Definition||00:03:00|
|Public or Private Bug Bounty Program||00:04:00|
|What is HackerOne||00:05:00|
|Why Organizations will hire you||00:08:00|
|Assignment – Cyber Security & Ethical Hacking||3 weeks, 3 days|
|Order Your Certificate|
|Order Your Certificate QLS||00:00:00|