This course comprises of 4 sections with lots of hands-on, practice quizzes and a course completion assignment.
Learning how to hack can help you implement the strongest possible security practices. Its as much about finding and fixing security vulnerabilities as it is about anticipating them. Learning about the methods hackers use to infiltrate systems will help you resolve issues before they become dangerous.
There are several reasons to learn about Ethical Hacking
- Comprehend a Hackers Outlook
- Learn Unknown Techniques and Explore Improved Methods
- Aids with Progress and Quality Assurance
- Decent pay package
- The world is your Oyster
Section 1 is about Introduction to ethical hacking
In this section, there are 4 lectures. The first lecture gives an outline of information security discussing about activities on the Internet in 60 secs, information security elements, and the security functionality and usability triangle. The second lecture explains the various types of network attacks that can hamper your system. The third lecture explains the different stages of penetration testing used for ethical hacking. It also includes the information security laws and standards. The fourth lecture explains the basic concepts of hacking and how it is different from ethical hacking. The meaning of black hat, grey hat, and white hat hackers are dealt with.
Section 2 is about Network Fundamentals
This section comprises of 4 lectures and one practical session. The first lecture explains networking basics including various networking devices, area networks, and topologies. The second lecture explains network identifiers followed by MAC addressing and MAC spoofing in lectures 3 and 4. The fifth video gives a hands-on practical session on MAC address changing.
Section 3 is about Wireless Network Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about wireless networks followed by wireless modes and packet sniffing in lectures 2 and 3. The fourth video gives a hands-on practical session on Wireshark Network Packet Analyzer. The next lecture explains network mapper followed by a hands-on practical session on NMAP Network Mapper.
Section 4 is about IP Fundamentals
The section comprises of 4 lectures and two practical sessions. Lecture 1 talks about IP spoofing followed by a hands-on practical session on IP address changing. The next 3 lectures explain wired equivalent privacy or WEP, Wireless application protocols WPA and WPA2 followed by fake authentication concepts. The section ends with a hands-on practical session on wi-fi cracking.
So I welcome you to my course on Ethical Hacking.
All the best and happy learning!!!