Introduction to Cyber Security
Explore ethical hacking in our online course, "Intro to Cyber Security." Master attack vectors, defense mechanisms, and ethical considerations for a fulfilling ...
Explore ethical hacking in our online course, "Intro to Cyber Security." Master attack vectors, defense mechanisms, and ethical considerations for a fulfilling ...
Embark on a journey into the realm of cybersecurity with our comprehensive online course, "Introduction to Cyber Security - Ethical Hacking." In today's interconnected digital landscape, the need for skilled professionals who can safeguard against cyber threats has never been more critical.
The practice of Ethical Hacking involves the meticulous assessment and identification of vulnerabilities within digital systems, akin to the methods employed by malicious hackers. A certified ethical hacker plays a pivotal role in fortifying existing security measures while uncovering potential loopholes that could be exploited by adversaries. It's a profession that demands not only technical prowess but also a commitment to ethical standards. In this course, we delve into the ethical considerations surrounding hacking practices, emphasizing the importance of obtaining consent from clients before initiating any security assessments.
Key Learning Objectives:
Course Highlight
Introduction to Information Gathering Techniques (Recon) and Why
0:10:39Introduction to Hacking - Concepts and Terminologies
0:08:59Ethical Hacking vs Penetration Testing – Difference and objectives
0:09:17Security standards and laws governing hacking practices
0:09:26Security metrics and methodologies
0:05:58Hacking Lab Setup
0:10:17Getting acquainted with Kali Linux
0:10:28Scanning an environment – Network Scanning
0:09:18Introduction to Information Gathering Techniques (Recon) and Why
0:07:00Active and Passive Recon
0:08:16Reconnaissance – Target
0:15:18Reconnaissance – Open Source Intel Gathering
0:15:01Reconnaissance – Network and Web tools
0:09:58Scanning an environment – Port Scanning
0:09:46Scanning an environment – Vulnerability Scanning
0:16:56Basic understanding of how web works
Laptop/Desktop with Kali Linux and active internet connection
Basics of Cyber Security
Security standards and laws governing the security standards
Difference between ethical hacking and penetration testing
Kali linux and working with it
Active and Passive recon
Port, Network, and Vulnerability scanning
Basics of metasploits
0.0
Dr. R Rakesh is currently working as Assistant Professor in VIT University. He is a doctorate from College of Engineering Guindy, Chennai. He has done his Masters and Bachelor's degree in Computer Science under Anna University, Chennai. He has 6 years of research experience and nearly 3 years of teaching experience. He has publications in reputed International journals and conferences such as Springer and IEEE indexed by SCI and Scopus. His entire Ph.D program was funded by College of Engineering Guindy, Chennai. His area of research interests includes Cyber Security, Web Security and Machine Learning.
View DetailsThis website uses cookies to personalize content and analyse traffic in order to offer you a better experience. Cookie policy