Ethical Hacking Online Training and Certification

  • (25 REVIEWS )

This course is meant for those professionals who are looking for comprehensive and total knowledge in the network security domain. This is the only course which teaches both hacking and countermeasure techniques. And in keeping with Pennonsoft's standards, this course is entirely hands on and real time oriented. And need we say, the instructors are network security and intrusion specialists with several years of experience.

Ethical Hacking Online Training Course Content :

Introduction to Ethical HackingIntroduction to Ethical Hacking

1.What is Hacking
2.Who is a Hacker
3.Skills of a Hacker
4.Types of Hackers
5.Reasons for Hacking
6.Who are at the risk of Hacking attacks
7.Effects of Computer Hacking on an organization
8.Network Security Challenges
9.Elements of Information Security
10.The Security, Functionality & Usability Triangle
11.What is Ethical Hacking
12.Why Ethical Hacking is Necessary
13.Scope & Limitations of Ethical Hacking
14.What is Penetration Testing
15.What is Vulnerability Auditing

Foot Printing

1.What is Foot Printing
2.Objectives of Foot Printing
3.Finding a company’s details
4.Finding a company’s domain name
5.Finding a company’s Internal URLs
6.Finding a company’s Public and Restricted URLs
7.Finding a company’s Server details
8.Finding the details of domain registration
9.Finding the range of IP Address
10.Finding the DNS information
11.Finding the services running on the server
12.Finding the location of servers
13.Traceroute analysis
14.Tracking e-mail communications

Scanning

1.What is network scanning
2.Objectives of network scanning
3.Finding the live hosts in a network
4.SNMP Enumeration
5.SMTP Enumeration
6.DNS Enumeration
7.Finding open ports on a server
8.Finding the services on a server
9.OS fingerprinting
10.Server Banner grabbing tools
11.What is a Vulnerability Scanning

Denial of Service

1.What is a DoS attack
2.What is a DDoS attack
3.Symptoms of a Dos attack
4.DoS attack techniques
5.What is a Botnet
6.Defending DoS attacks

Denial of Service

1.What is a DoS attack
2.What is a DDoS attack
3.Symptoms of a Dos attack
4.DoS attack techniques
5.What is a Botnet
6.Defending DoS attacks

Curriculum
Roadmap
Certification
FAQ's
Reviews
Lorem Ipsum
Agile Scrum Master Certification Training

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make.

Lorem Ipsum
Agile Scrum Master Certification Training

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make.

Lorem Ipsum
Agile Scrum Master Certification Training

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make.