Penetration Testing$1500 USD
About this course
Penetration Testing, also called ethical hacking or Pen Testing is the practice of testing computer networks, systems, and web applications to find vulnerabilities that can be exploited by a hacker. It can be done manually or through automated software and is increasingly being used by organizations to stay on top of their cybersecurity compliance and prevent attacks before they happen.
Penetration testing is conducted when new networks and applications are added or modified, security patches are run, and when end-user policies are updated. are also called white hat According to the Bureau of Labor Statistics, the demand for Information Security Analysts, which includes Penetration testers, is expected to increase 28% percent through 2026. If you have an innate curiosity of how systems and networks work and are eager to learn new tools, this is the course for you.
Number of jobs in the U.S. – 6,000+ (Source: LinkedIn)
U.S. National Average salary – $117,105/year (Source: ZipRecruiter)
This course includes in depth training to learn how to pentest modern infrastructures including servers and networks. It aims to give you a comprehensive understanding of pentesting complex applications running on Public and Private Cloud infrastructures.
Prerequisite – None required. Knowledge of windows and Linux operating systems is helpful.
• Cyber Ethics-Hacking Introduction • Information Gathering 1 • Information Gathering 2 • Scanning 1 • Scanning 2 • Virus, Worms • Trojans & Backdoors • Sniffers & keyloggers • Proxy Servers & VPNs • Social Engineering • Email, DNS, IP spoofing • HoneyPots • System Hacking & Security • Bots,Botnets & DOS • Cryptography
Website Hacking & Security
• Vulnerability Research • SQL Injection 1 • SQL Injection 2 • XSS Attacks & Countermeasures • Information Disclosure Vulnerabilities • Buffer Overflow Attacks 1 • Buffer Overflow Attacks 2 • Session Hijacking Attacks • Vulnerability Assessment & Penetration Testing • OWASP top 10 vulnerability
Information & Application Security
• Firewalls, IDS, Evading IDS • Assembly Language Basics • Metasploit Framework • Reverse Engineering & Countermeasures • Threat Hunting • SIEM log reviews • Incident Response
Cyber Crime Investigation
• Introduction to Cyber Crime Investigation • Handling Real World Cyber Crimes • Investigating Cyber Pornography Crimes • Cyber Forensics overview