scorecardresearch
Naukri Learning > ethical hacking

Refine Results

Course Level

Mode of learning

Category

"ethical hacking" courses, certification and training

  1. Practical Ethical Hacking - The Complete Course

    Welcome to this course on Practical Ethical Hacking . To enjoy this course, you need nothing but a positive attitude and a desire to learn. No prior knowledge is required. In this course, you will learn the practical side of ethical hacking. Too many courses teach students tools and concepts that are never used in the real world. In this course, we will focus only on tools and topics that will make you successful as an ethical hacker. The course is incredibly hands on and will cover many foundational topics. In this course, we will cover: A Day in the Life on an Ethical Hacker . What does an ethical hacker do on a day to day basis? How much can he or she make? What type of assessments might an ethical hacker perform? These questions and more will be answered. Effective Notekeeping. An ethical hacker is only as good as the notes he or she keeps. We will discuss the important tools you can use to keep notes and be successful in the course and in the field. Networking Refresher. This section focuses on the concepts of computer networking. We will discuss common ports and protocols, the OSI model, subnetting, and even walk through a network build with using Cisco CLI. Introductory Linux. Every good ethical hacker knows their way around Linux. This section will introduce you to the basics of Linux and ramp up into building out Bash scripts to automate tasks as the course develops. Introductory Python. Most ethical hackers are proficient in a programming language. This section will introduce you to one of the most commonly used languages among ethical hackers, Python. You'll learn the ins and outs of Python 3 and by the end, you'll be building your own port scanner and writing exploits in Python. Hacking Methodology. This section overviews the five stages of hacking, which we will dive deeper into as the course progresses. Reconnaissance and Information Gathering. You'll learn how to dig up information on a client using open source intelligence. Better yet, you'll learn how to extract breached credentials from databases to perform credential stuffing attacks, hunt down subdomains during client engagements, and gather information with Burp Suite. Scanning and Enumeration. One of the most important topics in ethical hacking is the art of enumeration. You'll learn how to hunt down open ports, research for potential vulnerabilities, and learn an assortment of tools needed to perform quality enumeration. Exploitation Basics. Here, you'll exploit your first machine! We'll learn how to use Metasploit to gain access to machines, how to perform manual exploitation using coding, perform brute force and password spraying attacks, and much more. Mid-Course Capstone. This section takes everything you have learned so far and challenges you with 10 vulnerable boxes that order in increasing difficulty. You'll learn how an attacker thinks and learn new tools and thought processes along the way. Do you have what it takes? Exploit Development. This section discusses the topics of buffer overflows. You will manually write your own code to exploit a vulnerable program and dive deep into registers to understand how overflows work. This section includes custom script writing with Python 3. Active Directory. Did you know that 95% of the Fortune 1000 companies run Active Directory in their environments? Due to this, Active Directory penetration testing is one of the most important topics you should learn and one of the least taught. The Active Directory portion of the course focuses on several topics. You will build out your own Active Directory lab and learn how to exploit it. Attacks include, but are not limited to: LLMNR poisoning, SMB relays, IPv6 DNS takeovers, pass-the-hash/pass-the-password, token impersonation, kerberoasting, GPP attacks, golden ticket attacks, and much more. You'll also learn important tools like mimikatz, Bloodhound, and PowerView. This is not a section to miss! Post Exploitation. The fourth and fifth stages of ethical hacking are covered here. What do we do once we have exploited a machine? How do we transfer files? How do we pivot? What are the best practices for maintaining access and cleaning up? Web Application Penetration Testing. In this section, we revisit the art of enumeration and are introduced to several new tools that will make the process easier. You will also learn how to automate these tools utilize Bash scripting. After the enumeration section, the course dives into the OWASP Top 10. We will discuss attacks and defenses for each of the top 10 and perform walkthroughs using a vulnerable web applications. Topics include: SQL Injection, Broken Authentication, Sensitive Data Exposure, XML External Entities (XXE), Broken Access Control, Security Misconfigurations, Cross-Site Scripting (XSS), Insecure Deserialization, Using Components with Known Vulnerabilities, and Insufficient Logging and Monitoring Wireless Attacks. Here, you will learn how to perform wireless attacks against WPA2 and compromise a wireless network in under 5 minutes. Legal Documentation and Report Writing. A topic that is hardly ever covered, we will dive into the legal documents you may encounter as a penetration tester, including Statements of Work, Rules of Engagement, Non-Disclosure Agreements, and Master Service Agreements. We will also discuss report writing. You will be provided a sample report as well as walked through a report from an actual client assessment. Career Advice. The course wraps up with career advice and tips for finding a job in the field. At the end of this course, you will have a deep understanding of external and internal network penetration testing, wireless penetration testing, and web application penetration testing. All lessons taught are from a real-world experience and what has been encountered on actual engagements in the field. Note: This course has been created for educational purposes only. All attacks shown were done so with given permission. Please do not attack a host unless you have permission to do so.

    Online self studyIntermediate
    ₹ 7,680 95% OFF ₹ 420 Take this Course

    Ethical Hacking, Languages,

    Offered by:  UDEMY
  2. The Complete Ethical Hacking Course Bundle

    There is no need to spend years going through hundreds of different courses and still being average when it comes to expertise in ethical hacking. Imagine you know everything important in the domain of ethical hacking. You know how hackers would attack your systems, websites & networks but more importantly you know how you can secure all your systems from hackers. ALL OF THIS IS POSSIBLE IF YOU ENROLL IN THE COMPLETE ETHICAL HACKING COURSE BUNDLE! | This is the most comprehensive ethical hacking course out there in the market. It is a set of 5 different courses that will take you from beginner to expert, through easy to follow on-demand video lectures, articles, and other resources. In the course, you will learn everything about ethical hacking & penetration testing and you will know how hackers hack and what you can do to stop them. This course is for you if you are looking to start a career in ethical hacking, if you want to take you career to the next level, or even if you are simply interested in protecting your systems

    Online self studyBeginner
    ₹ 4,680 Enquire Now

    Ethical Hacking,

    Offered by:  StationX
  3. The Complete Ethical Hacking Course: Beginner to Advanced

    Gain the ability to do ethical hacking and penetration testing by taking this course! Get answers from an experienced IT expert to every single question you have related to the learning you do in this course including installing Kali Linux, using VirtualBox, basics of Linux, Tor, Proxychains, VPN, Macchanger, Nmap, cracking wifi, aircrack, DoS attacks, SLL strip, known vulnerabilities, SQL injections, cracking Linux passwords, and more topics that are added every month!

    25 hoursOnline self studyBeginner
    ₹ 420 Enquire Now

    Ethical Hacking

    Offered by:  UDEMY
  4. Penetration Testing and Ethical Hacking

    If you are considering working in the cyber security industry, then this training will benefit you greatly. With Cybrary's online Penetration Testing and Ethical Hacking course, you will learn how to protect users from cyber attackers by becoming an ethical hacker and learning to exploit networks yourself. | As the internet continues to advance, cybercrimes do as well. Criminals no longer need to leave their homes to commit crimes, they can do so easily with a few clicks of a mouse and an internet connection. While current technology has given us access to huge amounts of information on websites and mobile devices and simplified tasks like shopping, paying bills, and banking services, it has also given rise to the need for ethical hackers to battle cyber criminals. There is no better time than now to begin a career in the cyber security industry

    24 hoursOnline self studyIntermediate
    Enquire Now

    Ethical Hacking, Cyber Security, IOT

    Offered by:  Cybrary
  5. Ethical Hacking Ultimate Course

    This course starts from the very beginning, making it a great resource for newbies who are just starting out in Penetration Testing or cyber security individuals that will definitely benefit from it. Intermediate and advanced hackers can also use this course as a refresher. | This comprehensive course will cover all aspects of Ethical Hacking as well as integration with Kali Linux. However, this isn’t just a normal theory based courses, but it is an extremely hands-on course, so you will not only read the fundamentals, but you will actually get to work with them using projects! Learning and getting hands-on on Ethical Hacking and Penetration Testing will opens many doors for your career. There are lot of career opportunities in Cyber Security Industry, and there is stunning and amazing opportunities coming in as IoT is becoming tomorrows future.

    Online self studyIntermediate
    $ 50

    Ethical Hacking, Cyber Security, IOT,

    Offered by:  Eduonix
  6. Learn Ethical Hacking From Scratch by StationX

    Welcome to my comprehensive course on Ethical Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking. The first thing you will learn is some basic information about ethical hacking and the different fields in penetration testing. | This course is focused on the practical side of penetration testing without neglecting the theory behind each attack. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing on your own machine. All the attacks explained in this course are launched against real devices in my lab. | The course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other. We will start by talking about how we can exploit these systems to carry out a number of powerful attacks. This course will take you from a beginner to a more advanced level -- by the time you finish, you will have knowledge about most penetration testing fields.

    Online self studyIntermediate
    Enquire Now

    Ethical Hacking

    Offered by:  StationX
  7. Certified Ethical Hacker Certification

    The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.| This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.| This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

    Offered by:  EC Council
  8. Learn Ethical Hacking From Scratch

    Welcome this comprehensive Ethical Hacking course! This course assumes you have NO prior knowledge in hacking and by the end of it you'll be able to hack systems like black-hat hackers and secure them like security experts! | This course is highly practical but it won't neglect the theory; we'll start with ethical hacking basics, breakdown the different penetration testing fields and install the needed software (on Windows, Linux and Mac OS X), then we'll dive and start hacking straight away. From here onwards you'll learn everything by example, by analysing and exploiting different systems such as networks, servers, clients, websites etc, so we'll never have any boring dry theoretical lectures.

    15 hoursOnline self studyBeginner
    ₹ 12,480 97% OFF ₹ 421 Take this Course

    Ethical Hacking

    Offered by:  UDEMY
  9. Certificate in White Hat Hacking

    Ethical hacker uses the skills and tools of malicious tools to find out vulnerabilities in an organization computer’s system. This course is the most sought after and popular credential. It tests the applicants on plethora of areas in ethical hacking like network, knowledge of ethics and countermeasures for attacks, Linux, operating system windows and web based attack. Moreover, a certified ethical hacker does the corrective, preventive and protective measures to protect the system before an actual breach can happen.

    100 hoursOffline self studyIntermediate
    $ 121 Enquire Now

    Ethical Hacking, Digital, Cloud Computing

    Offered by:  VSkills
  10. Hacking in Practice: Certified Ethical Hacking MEGA Course

    Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This course is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network. | This course is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing. | Finishing this ethical hacking course, you will get a free voucher for ISA CISS Examination! IT Security Academy (ISA) is a company that associates ITsec Professionals. Now we are proud to share our knowledge online. Certified experts (CISS, MCSE:MS, CEH, CISSP) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials youâ??ve ever seen online and prepare you not only for certification exams, but also teach you pratical skills. Youâ??re welcome to join us and start your training now.

    21 hoursOnline self studyBeginner
    ₹ 420 Enquire Now

    Ethical Hacking, Network Security, , Administration

    Offered by:  UDEMY
  11. Certified Ethical Hacker 9 (CEH v9)

    A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

    Offered by:  Koeing Solutions
  12. The Art Of Exploitation

    The Art of Exploitation is one of the most sophisticated attacks in Ethical Hacking. In this course, students will learn from scratch how to find a vulnerability or weakness in any system. Check for the right exploit to hack the system using this vulnerability, instead of using some kiddie script or waiting for a victim mistake clinking on a malicious link or attachment. Students will also learn how to write their one exploit using python script and use it to hack system affected with Buffer Overflow.

    3 hoursOnline self studyIntermediate
    Enquire Now

    Ethical Hacking

    Offered by:  Cybrary
  13. PG Certificate in Information and Cyber Security

    N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.

    Brochure
    Offered by:  N.L.Dalmia
  14. Certified Ethical Hacker (CEH)

    Tendering classroom training to prepare for certified ethical hacker exam, the certification fortifies the capabilities to guard against the vulnerabilities of network infrastructure and illegal hacking. It is one of the most sought after certification that offers the impetus to make an entry into the information security domain and in an array of information security skills. There are several organizations that have made certified ethical hacker certification a mandatory qualification for security related posts. The course covers the needs for roles like Computer network defense infrastructure support, CND Auditor, CND analyst and CND incident responder. Get enrolled for this classroom training.

    16 HoursOnline self studyIntermediate
    $ 353

    Information Security,

    Offered by:  Skillsoft
  15. Learn Network Hacking From Scratch (WiFi and Wired)

    Welcome to this comprehensive course on Network Hacking! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking and by the end of it you'll be at an intermediate level being able to hack into networks and connected devices like black-hat hackers and secure them like security experts. | This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into hacking you will first learn how to set up a lab and install needed software (works on Windows, Mac OS X and Linux), then the course is structured in a way that will take you through the basics of linux, computer systems, networks and how devices communicate with each other, then you will learn how to exploit this method of communication to carry out a number of powerful attacks.

    8 hoursOnline self studyBeginner
    ₹ 420 Enquire Now

    Offered by:  UDEMY
Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions