Certificate in White Hat Hacking

Online

4,129

Enroll Now

What is this course about

 1. Introduction
1.1 Ethical Hacking Evolution and Hacktivism
1.2 Need and Technical Terms
1.3 Skills Needed and Stages of Hacking
1.4 Ethical Hacking Modes
1.5 Networking Basics
1.6 Penetration Testing

2. Ethics
2.1 Moral Direction and Hacker Ethics Principles
2.2 Security Grey Areas
2.3 Cyber Laws (IT Act, etc.)
2.4 Rules of Engagement

3. Cryptography
3.1 Cryptography Basics
3.2 Evolution and Data Encryption Methods
3.3 Symmetric and Asymmetric key Cryptography
3.4 Private and Public Key Exchange
3.5 Stream and Block Ciphers
3.6 Secret Key Cryptography
3.7 Message Authentication and Hash Functions
3.8 Digital Signatures and Public Key Infrastructure

4. Footprinting
4.1 Information Gathering
4.2 DNS, whois and ARIN records
4.3 Using traceroute, e-mail tracking and web spider
4.4 Google Hacking

5. Social Engineering
5.1 Social Engineering Concepts
5.2 Social Engineering Attack Types
5.3 Countermeasures for Social Engineering

6. Physical Security
6.1 Basics and Need
6.2 Physical Security Countermeasures

7. Network Scanning and Enumeration
7.1 Network Scanning Techniques
7.2 Scanners and Analyzers
7.3 HTTP tunneling and IP spoofing
7.4 Enumerating null sessions and SNMP enumeration

8. Network Attacks
8.1 TCP/IP Packet Formats and Ports
8.2 Firewall and IDS
8.3 Switch Attacks
8.4 Router Attacks
8.5 DoS, DDoS, Session Hijacking

9. Wireless Networks
9.1 Wireless LAN Basics
9.2 WLAN Security
9.3 WLAN Attacks
9.4 WLAN Attack Countermeasures

10. System Hacking
10.1 Password Attacks, Vulnerabilities and Countermeasure
10.2 Spyware
10.3 Rootkit
10.4 Steganography
10.5 Trojans
10.6 Computer worm
10.7 Backdoor
10.8 Buffer Overflow

11. Windows Hacking
11.1 Memory and Process
11.2 Windows Architecture
11.3 Windows Security
11.4 Windows Attacks
11.5 Countermeasures
11.6 Windows Memory Protection, SEH and OllyDbg

12. Linux Hacking
12.1 Linux Basics
12.2 Linux Threats
12.3 Linux Security
12.4 Kernel Patching

13. Web Hacking
13.1 Web Basics
13.2 Web Server Attacks
13.3 Web Application Attacks
13.4 VoIP Attacks

14. Emerging Trends
14.1 Cloud Computing and Security
14.2 Identity Access Management
14.3 Security Policies
14.4 Mobile Security
14.5 New Threats

What are the course deliverables ?

 Process
• Post registration get login credentials of your online profile
• Download Soft copy of the reading material
• Receive hard copy reading material
• Post preparation, schedule exam date and exam center from your online profile within one year of order date.
• Clear the exam and get hard copy and soft copy certificate with LinkedIn recommendation and tagging on MonsterIndia.com and Shine.com

Program Schedule

 • No fixed dates.
• Prepare and appear for certification exam

Program Highlights

 Benefits of Vskills Certification
• Government certification
• No Minimum educational qualification
• No time commitment
• Improve employability
• Certification valued and approved by Industry
• Become a part of Vskills Job centre for life
• Enriched professional experience by being a Vskills Alumni

Desired Course Seeker Profile

 • No minimum eligibility
• No experience needed