The cybersecurity and ethical hacking course equips you with the skills to assess and exploit system vulnerabilities using ethical hacking tools such as Kali Linux, Metasploit, Nmap, and Wireshark. You’ll learn to set up secure hacking environments, perform reconnaissance, conduct vulnerability assessments, and simulate attacks on web applications and wireless networks. The course also covers social engineering attacks and AI-based tools for threat detection, equipping you to identify and mitigate common cybersecurity vulnerabilities.You’ll gain the practical skills needed to secure systems and identify potential threats, preparing you for a career in ethical hacking and cybersecurity. By the end of this ethical hacking course, you’ll be able to perform penetration testing, vulnerability assessments, and secure web and wireless networks. Hands-on projects, like assessing a small business website's vulnerabilities and conducting wireless network penetration tests, will provide real-world experience.
Overview
Syllabus
- Introduction to Ethical Hacking
- In this module, we will explore the basics of ethical hacking, including its importance, legal and ethical considerations, career paths and objectives, essential skills, and commonly used hacking tools.
- Setting up a Hacking Lab
- This module covers the process of setting up a secure and controlled environment for ethical hacking, including the use of virtual machines and essential tools such as Kali Linux, VMware, Ubuntu VMware, Windows VMware, Metasploit and more.
- Footprinting & Reconnaissance
- In this module, we will explore techniques for gathering information about a target system or network to identify potential vulnerabilities, a process known as footprinting and reconnaissance. We will also perform network traffic analysis using Wireshark.
- Vulnerability Assessment, Exploitation and Scanning
- In this module, we will focus on methods for assessing system vulnerabilities, exploiting them using Metasploit and performing network scans with Nmap to identify weaknesses in applications or networks. We will also cover post-exploitation techniques.
- Web Application Hacking
- This module delves into the security flaws of web applications and explores common web server vulnerabilities using CrowdStrike.
- Wireless Network Hacking
- In this module, we will learn how to penetrate a wireless network using specialized tools and leverage an AI-based tool to detect suspicious devices within the network.
- Social Engineering Attacks
- This module examines the psychology behind social engineering attacks, with a focus on social engineering attack vectors and countermeasures such as security awareness training.
Taught by
Aniket Amdekar