I'm a Copywriter in a Digital Agency, I was searching for courses that'll help me broaden my skill set. Before signing up for Rob's.
Ethical Hacking
- Cyber Security, Programs
- 1 (Registered)
-
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks.
Footprinting and Reconnaissance:
Footprinting involves the process of gathering information about a target system or network that can be used to identify potential vulnerabilities. This information can be obtained from public sources such as search engines, social media platforms, and online forums. Reconnaissance, on the other hand, is the process of actively probing a target network or system for weaknesses.
Scanning Networks:
Once a target system or network has been identified, the next step is to scan it for vulnerabilities. This involves using tools such as port scanners and vulnerability scanners to identify open ports, running services, and potential vulnerabilities.
Enumeration:
Enumeration is the process of gathering information about a target system or network by querying services and systems for information such as usernames, passwords, and shared resources.
System Networks:
System networks refer to the interconnected systems that make up a network. Ethical hackers need to have a good understanding of the network topology and configuration in order to identify potential vulnerabilities.
Malware Threats:
Malware threats refer to malicious software that is designed to compromise the security of a system or network. Ethical hackers need to be familiar with various types of malware such as viruses, worms, and Trojans in order to identify and mitigate potential threats.
Sniffing:
Sniffing involves intercepting network traffic in order to capture data such as usernames, passwords, and other sensitive information. Ethical hackers use this technique to identify potential vulnerabilities in network security.
Social Engineering:
Social engineering involves the use of psychological manipulation to trick individuals into divulging sensitive information such as passwords or access credentials. Ethical hackers use this technique to test the effectiveness of security awareness training programs.
Denial-of-Service:
Denial-of-Service attacks involve overwhelming a target system or network with traffic in order to disrupt or deny access to legitimate users. Ethical hackers use this technique to test the resilience of a network or system to such attacks.
Session Hacking:
Session hacking involves hijacking a user’s session on a network or system in order to gain unauthorized access to resources. Ethical hackers use this technique to identify potential vulnerabilities in session management and access control mechanisms.
Hacking Webservers:
Web servers are a common target for cybercriminals. Ethical hackers use techniques such as SQL injection, cross-site scripting, and file inclusion to identify potential vulnerabilities in web server security.
Hacking Web Applications:
Web applications are another common target for cybercriminals. Ethical hackers use techniques such as parameter tampering, session hijacking, and directory traversal to identify potential vulnerabilities in web application security.
SQL Injection:
SQL injection is a technique that involves exploiting vulnerabilities in web applications that use SQL databases. Ethical hackers use this technique to identify potential vulnerabilities in web application security.
Hacking Wireless Networks:
Wireless networks are becoming increasingly popular, but they are also vulnerable to security threats. Ethical hackers use techniques such as wardriving, packet sniffing, and deauthentication attacks to identify potential vulnerabilities in wireless network security.
Hacking Mobile Platforms:
Mobile devices are now a ubiquitous part of modern life, but they are also vulnerable to security threats. Ethical hackers use techniques such as rooting, jailbreaking, and code injection to identify potential vulnerabilities in mobile platform security.
Evading IDS, Firewalls, and Honeypots:
Intrusion detection systems (IDS), firewalls, and honeypots are all designed to detect and prevent unauthorized access to a system or network.
Instructor
0 rating
Related Courses
– Mary Kate McDevitt, Skillshare teacher with 50,000 students
Join our community of students around,the world helping you succeed.