________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course Description: Pentesting and Ethical Hacking
This course is taught in online mode and consists of 15 units. The duration of the course is distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in teletraining modality (100% bonus option) and face-to-face and tele-face-to-face training actions can also be carried out on demand.
Introduction
Learn about the tools most used by cybersecurity professionals to perform penetration testing, vulnerability analysis, and system audits . In this course you will learn how to use each of them to explore, exploit and protect different environments and web applications.
Addressed to
The course is aimed at people who have a basic knowledge of computers and networks, and who want to get started in the world of ethical hacking .
Course content
1. Introduction to Ethical Hacking
- What is ethical hacking?
- Legal aspects of ethical hacking
- Ethical hacker profiles
2. Phases of ethical hacking in attacks on systems and networks
- Types of attacks
- Ethical hacking tools
- Vulnerability tests
3. Phases of ethical hacking in attacks on Wi-Fi networks
- Types of attacks
- Ethical hacking tools
- Types of Wi-Fi security
- Sniffing
4. Phases of ethical hacking in web attacks
- Types of attacks
- Ethical hacking tools
- Types of web security
- Type of security test in web environments
5. Kali linux
6. Nmap teaching unit
7. Metasploit
8. Wireshark
9. John the ripper
10. Hashcat
11. Hydra
12. Burp suite
13. Zed attack proxy
14. Sqlmap
15. Aircrack-ng
Previous requirements
No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
Rates
If you are interested in taking this course in any training modality, please contact us.