TAKE THIS COURSE₹ 3,800
Course Currilcum
-
- Brief Introduction of cyber Security 00:00:00
- Information Security Overview 00:00:00
- Hacking Concepts 00:00:00
- Ethical Hacking Concepts 00:00:00
- Information Security Laws and Standards 00:00:00
- Quiz – 1 00:10:00
-
- Introduction 00:00:00
- Quiz – 2 00:05:00
- Networking Basics Part 1 00:00:00
- Networking Basics Part 2 00:00:00
- Quiz – 3 00:05:00
- Exploring Kali Linux 00:00:00
- Installing Kali Linux 00:00:00
- Quiz – 4 00:10:00
- File system of Linux 00:00:00
- Common Commands 00:00:00
- Quiz – 5 00:10:00
- Introduction and NMAP 00:00:00
- Penetration Test Lab 00:00:00
- NMAP Multiple Targets & TCP Connect Scan 00:00:00
- Stealth Scan & ACK Probe 00:00:00
- Service and OS detection & Aggressive Scanning 00:00:00
- UDP Scanning 00:00:00
- Identifying Website Technologies 00:00:00
- Introduction of Nessus 00:00:00
- Introduction to Social Engineering 00:00:00
- Relevance of Social Engineering Unlimited
- Human Based Social Engineering 00:00:00
- Computer Based Social Engineering 00:00:00
- Doppelganger Domain Unlimited
- Mobile Based Social Engineering Unlimited
- Introduction to Cryptography Unlimited
- Symmetric vs. Asymmetric Encryption Unlimited
- Hash Functions and Digital Signatures Unlimited
- Public Key Infrastructure (PKI) Unlimited
- Cryptographic Attacks Unlimited
- SSL/TLS Basics Unlimited
- Implementing and Managing Encryption Unlimited
- Understanding Social Engineering Unlimited
- Phishing Techniques and Countermeasures Unlimited
- Pretexting and Impersonation Unlimited
- Baiting and Quizzes Unlimited
- Social Engineering Tools Unlimited
- Mitigating Social Engineering Attacks Unlimited
- Introduction to Penetration Testing Unlimited
- Penetration Testing Frameworks (PTES, NIST, OSSTMM) Unlimited
- Penetration Testing Phases Unlimited
- Reporting and Documentation Unlimited
- Creating and Presenting a Penetration Test Report Unlimited
- Ethical and Legal Considerations in Penetration Testing Unlimited
- Introduction to IoT Security Unlimited
- Common IoT Vulnerabilities Unlimited
- Securing IoT Devices and Networks Unlimited
- IoT Penetration Testing Unlimited
- IoT Privacy Concerns Unlimited
- Buffer Overflow Attacks Unlimited
- Exploit Development Unlimited
- Advanced Persistent Threats (APTs) Unlimited
- Zero-Day Vulnerabilities Unlimited
- Red Team vs. Blue Team Exercises Unlimited
- Ethical Hacking in a DevOps Environment Unlimited