Course Name
Ethical Hacking v12 - Learn Hacking
Contact Hours: 40
Course Description
Wanting to learn how to hack?
“White-Hat” hacking to be more specific. The Ethical Hacking v12 course covers ethical hacking of networks and system penetration testing. This course covers all of the exam objectives for the EC-Council exam ECC 312-50 version 12 exam. Students are taken step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows and Kali Linux-based. You have access and instructions on setting up a full virtual environment to allow you to gain practical hands-on experience during the course. A broad range of examples used by hackers is covered.
The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.
Please note: Course of study may be completed earlier than indicated.
Outcome
In this course, you will learn hands-on penetration testing and hacking skills including:
Footprinting, scanning, and enumeration
Vulnerability analysis
Sniffing and Spoofing
Social engineering
Denial of Service
Web server, web application, and database hacking
System hacking using various forms of malware and tools
Wireless network and mobile device hacking
Evading IDS
Firewalls and Honeypots
Cryptography
Cloud computing and Internet of Things hacking
Assessment
Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.
Required Book(s)
All training is delivered online; no additional purchase required.
Outline
Ethical Hacking - Introduction to Ethical Hacking
Ethical Hacking - Footprinting and Reconnaissance
Ethical Hacking - Network Scanning
Ethical Hacking - Enumeration
Ethical Hacking - Vulnerability Analysis
Ethical Hacking - Malware Threats
Ethical Hacking - Sniffing
Ethical Hacking - Social Engineering
Ethical Hacking - Denial of Service
Ethical Hacking - Session Hijacking
Ethical Hacking - Hacking Webservers
Ethical Hacking - Hacking Web Applications
Ethical Hacking - SQL Injection
Ethical Hacking - Hacking Wireless Networks
Ethical Hacking - System Hacking
Ethical Hacking - Hacking Mobile Platforms
Ethical Hacking - Evading IDS, Firewalls, and Honeypots
Ethical Hacking - Cryptography
Ethical Hacking - Cloud Computing
Ethical Hacking- IoT Hacking
Ethical Hacking v12 - Learn Hacking