________________________________________________________________
 Do you want to take this course? Request more information
 Email: info@nanforiberica.com , Phones: +34 91 031 66 78 / +34 605 98 51 30, WhatsApp: +34 685 60 05 91 , Our Offices
 ________________________________________________________________
           
      
    
      
      
      
          
          
          
          
  
     Course Description: Pentesting and Ethical Hacking
 This course is taught in online mode and consists of 15 units. The duration of the course is distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
 Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
 The course is taught in teletraining modality (100% bonus option) and face-to-face and tele-face-to-face training actions can also be carried out on demand.
 Introduction
 Learn about the tools most used by cybersecurity professionals to perform penetration testing, vulnerability analysis, and system audits . In this course you will learn how to use each of them to explore, exploit and protect different environments and web applications.
 Addressed to
 The course is aimed at people who have a basic knowledge of computers and networks, and who want to get started in the world of ethical hacking .
 Course content
 1. Introduction to Ethical Hacking
-  What is ethical hacking?
 
-  Legal aspects of ethical hacking
 
-  Ethical hacker profiles
 
 2. Phases of ethical hacking in attacks on systems and networks
-  Types of attacks
 
-  Ethical hacking tools
 
-  Vulnerability tests
 
 3. Phases of ethical hacking in attacks on Wi-Fi networks
-  Types of attacks
 
 - Ethical hacking tools
 
-  Types of Wi-Fi security
 
-  Sniffing
 
 4. Phases of ethical hacking in web attacks
-  Types of attacks
 
-  Ethical hacking tools
 
-  Types of web security
 
-  Type of security test in web environments
 
 5. Kali linux
 6. Nmap teaching unit
 7. Metasploit
 8. Wireshark
 9. John the ripper
 10. Hashcat
 11. Hydra
 12. Burp suite
 13. Zed attack proxy
 14. Sqlmap
 15. Aircrack-ng
 Previous requirements
 No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
 Rates
 If you are interested in taking this course in any training modality, please contact us.
   
        
      
    
      
      
      
          
            ________________________________________________________________
 Do you want to take this course? Request more information
 Email: info@nanforiberica.com , Phones: +34 91 031 66 78 / +34 605 98 51 30, WhatsApp: +34 685 60 05 91 , Our Offices
 ________________________________________________________________