Class 1 - Introduction into ethical hacking , tools used and methodologies.
An Ethical Hacker exposes vulnerabilities in software to help business owners fix those security holes before a malicious hacker discovers them.
This training course provides you the hands-on training required to master the techniques hackers leverage to penetrate network systems and fortify yours against it. This ethical hacking course is aligned with the latest CEH v12 by the EC-Council and will adequately prepare you to scale up your blue team skills.
Pre-requisites
Module 01- Introduction to Ethical Hacking
Lesson 01 - Information Security Overview
-
Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds
-
Essential Terminology
-
Elements of Information Security
-
The Security, Functionality, and Usability Triangle
Lesson 02 - Information Security Threats and Attack Vectors
-
-
Motives, Goals, and Objectives of Information Security Attacks
-
Top Information Security Attack Vectors
-
Information Security Threat Categories
-
Types of Attacks on a System
-
Information Warfare
-