Pentesting and Ethical Hacking

________________________________________________________________

Do you want to take this course? Request more information

Email: info@nanforiberica.com , Phones: +34 91 031 66 78 / +34 605 98 51 30, WhatsApp: +34 685 60 05 91 , Our Offices

________________________________________________________________

Course Description: Pentesting and Ethical Hacking

This course is taught in online mode and consists of 15 units. The duration of the course is distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in teletraining modality (100% bonus option) and face-to-face and tele-face-to-face training actions can also be carried out on demand.


    Introduction

    Learn about the tools most used by cybersecurity professionals to perform penetration testing, vulnerability analysis, and system audits . In this course you will learn how to use each of them to explore, exploit and protect different environments and web applications.


    Addressed to

    The course is aimed at people who have a basic knowledge of computers and networks, and who want to get started in the world of ethical hacking .


    Course content

    1. Introduction to Ethical Hacking

    • What is ethical hacking?
    • Legal aspects of ethical hacking
    • Ethical hacker profiles

    2. Phases of ethical hacking in attacks on systems and networks

    • Types of attacks
    • Ethical hacking tools
    • Vulnerability tests

    3. Phases of ethical hacking in attacks on Wi-Fi networks

    • Types of attacks
    • Ethical hacking tools
    • Types of Wi-Fi security
    • Sniffing

    4. Phases of ethical hacking in web attacks

    • Types of attacks
    • Ethical hacking tools
    • Types of web security
    • Type of security test in web environments

    5. Kali linux

    6. Nmap teaching unit

    7. Metasploit

    8. Wireshark

    9. John the ripper

    10. Hashcat

    11. Hydra

    12. Burp suite

    13. Zed attack proxy

    14. Sqlmap

    15. Aircrack-ng


    Previous requirements

    No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.


    Rates

    If you are interested in taking this course in any training modality, please contact us.


    ________________________________________________________________

    Do you want to take this course? Request more information

    Email: info@nanforiberica.com , Phones: +34 91 031 66 78 / +34 605 98 51 30, WhatsApp: +34 685 60 05 91 , Our Offices

    ________________________________________________________________

    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Formación presencial y telepresencial

    Do you need another training modality?

    bonificaciones

    Bonuses for companies