YoVDO

Ethical Hacking Fundamentals

Offered By: LearnKartS via Coursera

Tags

Ethical Hacking Courses Cybersecurity Courses Network Security Courses Penetration Testing Courses Social Engineering Courses Web Security Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Welcome to this Ethical Hacking Fundamentals course! Ethical hacking, also called as penetration testing or white hat hacking, involves identifying and exploiting vulnerabilities, performing penetration tests, and applying countermeasures to safeguard systems against cybersecurity threats. This Ethical Hacking course not only provides knowledge but also prepares you for the CEH certification exam. Although formal education and hands-on experience in system administration or network security are regarded as advantages, prior knowledge of TCP/IP protocols, information security principles, and basic IT concepts is required for this penetration testing course. This CEH course includes engaging videos, quizzes, readings, and knowledge checks to provide you with a superior learning experience. By the end of this introduction to Ethical Hacking course, you will be able to - Recognize the fundamentals and techniques of ethical hacking. - Find and address security holes in networks and systems. - Perform security evaluations and penetration tests. - Put in place strong defenses to fend against online attacks. - Make responsible and lawful use of a variety of hacking tools and methods. - Handle ethical and legal issues when doing ethical hacking.

Syllabus

  • Course Introduction and Ethical Hacking Fundamentals
    • This module covers a comprehensive range of topics, beginning with an exploration of various hacking methodologies, cybersecurity fundamentals, and the practice of penetration testing. By the end of the module, learners grasp legal aspects and key security elements.
  • Footprinting and Reconnaissance
    • In this module, the learners will explore footprinting, methods, and tools used for hacking purposes. By the end, the learners have a solid grasp of advanced footprinting techniques and how to scan networks effectively to gather the information needed.
  • Social Engineering and Web Security
    • This module explores various social engineering techniques and phishing methods. By the end of the module, learners understand attack phases, defense and tools for detection and prevention.

Taught by

LearnKartS

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network