Cyber Security & Ethical Hacking

Cyber Security & Ethical Hacking

1 STUDENTS ENROLLED

Overview

The Cyber Security & Ethical Hacking is the best way for you to gain deep insight and knowledge of this topic. You will learn from industry experts and obtain an accredited certificate after completing the course. Enrol now for a limited-time discounted price.

Like all the courses of One Education, this Cyber Security & Ethical Hacking is designed with the utmost attention and thorough research. All the topics are broken down into easy to understand bite-sized modules that help our learners to understand each lesson very easily.

We don’t just provide courses at One Education; we provide a rich learning experience. After purchasing a course from One Education, you get complete 1-year access with tutor support. 

Our expert instructors are always available to answer all your questions and make your learning experience exquisite.

After completing the Cyber Security & Ethical Hacking, you will instantly get an e-certificate that will help you get jobs in the relevant field and will enrich your CV.

If you want to learn about this topic and achieve certifications, you should consider this Cyber Security & Ethical Hacking from One Education.

There are no hidden fees or exam charges. We are very upfront and clear about all the costs of the course. 

Course design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Will I receive a certificate of completion?

Upon successful completion, you will qualify for the UK and internationally-recognised certification and you can choose to make your achievement formal by obtaining your PDF Certificate at a cost of £9 and Hard Copy Certificate for £15.

Why study this course

Whether you’re an existing practitioner or aspiring professional, this course will enhance your expertise and boost your CV with key skills and an accredited qualification attesting to your knowledge.

The Cyber Security & Ethical Hacking is open to all, with no formal entry requirements. All you need is a passion for learning, a good understanding of the English language, numeracy and IT, and to be over the age of 16.

 

Course Curriculum

Introduction to Ethical Hacking
Hacking Terms 00:07:00
VA vs PT and Rule of Engagement 00:09:00
Methodologies 00:07:00
Type of Pen Testing 00:06:00
Phases of Penetration Test 00:04:00
10 Steps to Follow 00:04:00
Setting up a Penetration Testing Lab
What is Linux OS – Benefits 00:04:00
What is Kali Linux 00:03:00
Virtual Box Installation 00:06:00
Kali Linux Installation in VB 00:12:00
Install Metasploitable on Virtual Box 00:09:00
Install DVWA in Kali 00:18:00
Install TOR 00:09:00
Executing Basic Commands in Kali 00:12:00
Executing Advance Commands in Kali 00:14:00
Information Gathering
What is Information Gathering 00:08:00
Maltego Part 1 00:07:00
Maltego Part 2 00:06:00
HTTrack 00:05:00
The Harvester 00:02:00
NSLookup 00:03:00
RedHawk 00:05:00
SHODAN 00:09:00
OSNIT Framework 00:05:00
Scanning and Enumeration
What is Scanning 00:07:00
What is Nmap 00:05:00
Zenmap GUI 00:17:00
What is Enumeration 00:03:00
Types of Enumeration 00:03:00
Enumeration Using Hyena – 1 00:07:00
Enumeration Using Hyena – 2 00:06:00
VAPT
What is Vulnerability Assessment 00:04:00
Phases of Vulnerability Assessment 00:08:00
Vulnerability Scoring Systems 00:09:00
Introduction to Nessus 00:05:00
Create and Configure Nessus Network Policy 00:08:00
Nessus Launch Scan and Analyse Result 00:08:00
Firewalls
What is IDS 00:11:00
What Are Firewalls 00:10:00
What is DMZ 00:06:00
IDS Evasion Techniques 00:08:00
Firewall Evasion Techniques 00:09:00
Firewall Pentesting 00:02:00
WAPT
Introduction to Web Servers 00:05:00
Types of Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
Countermeasures of Web Servers? 00:05:00
OWASP Top 10 Attacks Part 1 00:05:00
OWASP Top 10 Attacks Part 2 00:07:00
Website Foot Printing Part 1 00:05:00
Website Foot Printing Part 2 00:03:00
Command Execution Low 00:06:00
Command Execution Medium 00:07:00
Configuring Burp Suite 00:16:00
File Upload Low 00:10:00
File Upload Medium 00:07:00
File Upload High 00:08:00
SQL Injection 00:04:00
SQL Injection II 00:05:00
Manual SQL 00:17:00
Automating SQL 00:09:00
Countermeasures of SQL Injection 00:03:00
What Is XSS 00:03:00
Types of XSS 00:06:00
XSS Low 00:11:00
XSS Medium 00:05:00
XSS High 00:11:00
Countermeasures of XSS 00:04:00
What is CSRF 00:06:00
CSRF Practical 00:07:00
What is a Brute Force Attack? 00:05:00
Brute Force Political 00:18:00
Web Application Penetration Testing? 00:09:00
Web Application Countermeasures 00:06:00
Denial of Service
What is Denial of Service (DOS)? 00:03:00
Types of DOS attack? 00:05:00
What is a BOTNET? 00:03:00
Malware Threats
Introduction to Malware 00:09:00
Trojan 00:08:00
Types of Trojans 00:08:00
Viruses and Worms 00:07:00
Types of Viruses 00:10:00
Countermeasures 00:07:00
Social Engineering
Introduction to Social Engineering 00:05:00
Social Engineering 00:06:00
Installing BeEF Framework 00:09:00
Getting User Credentials Using BeEF Framework 00:11:00
Cryptography
Introduction to Cryptography 00:05:00
Symmetric Encryption 00:03:00
DES and AES 00:06:00
Asymmetric Encryption 00:03:00
RSA and Diffie 00:07:00
Hashing 00:07:00
Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00
Digital Signatures 00:09:00
Transport Layer Security (TLS) 00:04:00
Calculating One Way Hashes Using HashCal 00:04:00
Basic Data Encryption Advance and Decryption Package 00:05:00
Report Writing
Introduction to Report Writing 00:08:00
Component of a Report 00:14:00
Bonus Section
Why we need to fix vulnerabilities 00:05:00
Hacker Sponsored Security 00:03:00
Key Terms in Bug Bounty Program 00:05:00
Bug Bounty Definition 00:03:00
Public or Private Bug Bounty Program 00:04:00
What is HackerOne 00:05:00
Why Organizations will hire you 00:08:00
TAKE THIS COURSE

 

 

COPYRIGHT © 2021 One Education