bag

The Complete Cyber Security Course : Part 2 - Hacking

3 years ago

Gain the knowledge hackers use to compromise systems and use it to protect your own!

Free USD $24.99

Created by: Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!

Expired Coupon

Share if you liked:

Gain the knowledge hackers use to compromise systems and use it to protect your own!

Published en 13 Feb 2021

Udemy UK


Lo que aprenderás


  • You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.

  • Requisitos


  • You should have completed two previous courses in order to continue learning. Course 1: Absolute Beginners Guide to Cybersecurity and Hacking Course 2: Absolute Beginners Guide to Cyber Security Part 1

  • Descripción


    You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.




    Section 1: Components of Hacking:


    Reconnaissance


    Scanning


    Gaining access


    Maintaining access


    Clearing tracks




    Section 2: Ethical hacking Mindmap


    Ethical hacking


    Places of ethical hacking


    Mind map




    Section 3: DoS and DDoS


    Denial of services


    Symptoms of dos attack


    Slow performance


    Increase in spam emails


    Unavailability of a resource


    Loss of access to a website


    Denial of access to any internet services


    Distributed denial of services (DDoS)


    DoS/DDoS attack techniques


    Land and flood attacks


    Service request floods




    Section 4: SYN flooding attach using hping3




    Section 5: Counter Measures


    Counter-measures


    DoS/DDoS countermeasure strategies


    Detech and neutralize handlers


    Monitoring the activities running on a system of network


    Deflect attacks by load balancing


    Mitigate attacks disabling unnecessary services


    Intrusion detection systems


    Wavelet analysis




    Section 6: Metasploit test


    Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make


    systems more secure. Metasploit is available for all popular operating systems.


    Vulnerability


    Exploit


    Payload


    Meterpreter


    ¿Para quién es este curso?


  • Students and Professionals interested in a career in Cyber Security and Ethical Hacking

  • This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

  • You should keep in mind that the Coupons last a maximum of 4 days or until 1000 registrations are exhausted, but it can expire anytime. Get the course with coupon by clicking on the following button:

    (Coupon valid for the first 1000 registrations): DF36F66931747C528C4E
    Udemy UK
    Tags:
    • #Cyber Security

    Add a new comment

    Subscribe to our newsletter
    Receive the latest Coupons and promotions Request Coupon