IT Security and Ethical Hacking
Learn the basics of IT Security, Ethical Hacking and its various concepts. Work on your certification!
START NOW IT Security and Ethical HackingWhat you'll learn
- Recently updated to be compatible with Cloud Computing Concepts
- Upon completion of this course, students will have a basic introduction to ethical hacking and its various concepts.
- You will be able to understand and apply information technologies concepts that include: vulnerabilities, defense-in-depth, penetration testing, the methodology for pentesting/ethical hacking, vulnerability management, incident management, and creating and implementing a security policy.
- You will also know the countermeasures that can be taken to protect yourself from the dangers of hacking, and all that that may entail.
- You will be able to identify what a SQL injection is along with the different wireless types and vulnerabilities. You will also gain a basic understanding of the concepts behind buffer overflow, cryptography and their weaknesses, mobile hacking, how to evade both firewalls and honeypots, and successfully evade IDS.
- Communicate with the instructor and openly ask questions that will be addressed within 48 hours!
- Download extra printable and saveable flash cards, games, slideshows, and other supplemental materials for each lecture in our course
- Participate in active discussions with other information technology students & participants becoming certified
- Apply your knowledge througout the course with quick quizzes
- No prerequisites for this course - A computer with Internet
- The majority of the tools used in this series must be run on a Windows machine. There might be a MAC equivalent, but the tools demonstrated were all run on a Windows machine.



0 comment:
Post a Comment