Geeks Academy

Certifications CYBER SECURITY
Exin Ethical Hacking
REQUEST INFOPRMATION

Certifications CYBER SECURITY
Exin Ethical Hacking

CYBER SECURITY

CYBER SECURITY

Certifications Exin Ethical Hacking

Exam certification will be held at one of the Italian office or remotely

CertificationsCYBER SECURITYDuration Weekend

The course provides an understanding and development of the following topics: Network sniffing (gathering information from network traffic); Cracking a WEP and WPA (2) key from a wireless network; Network vulnerability scanning; Basic penetration of computer systems Password cracking; Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)


CYBER SECURITY: Exin Ethical Hacking

CYBER SECURITY

Duration: 18

Job Placement

English

Where the Certifications Exin Ethical Hacking will take place?

City

Promotions

Scholarships

Capacity

Online - November 2020

10% OFF
For all registration received by 30/07/2020

2 Scholarships
available at the moment

10 places available
Certifications capacity: 12

Certifications Exin Ethical Hacking | CYBER SECURITY duration Weekend

What you will study
The course provides an understanding and development of the following topics:

Network sniffing (gathering information from network traffic)
Cracking a WEP and WPA(2) key from a wireless network
Network vulnerability scanning
Basic penetration of computer systems
Password cracking
Web-based hacking, containing SQL Injections (SQLi), Cross-Site Scripting (XSS), Remote File Inclusions (RFI)

 

- Introduction to Ethical Hacking
Legal implication in hacking
Different types of hackers

- Basic principles
Differences between Black and white box test
The different stages of the hacker process

- Networking sniffing
The different tools for sniffing
Use of major sniffing tools
Knowledge of the http protocol
Extracting info from the http protocol

- Hacking a wireless network
Preparation
Collection of info of your WIFI
Aircrack NG
Knowledge of Aerodump NG
Different types of Aircrack functions
Meaning ESSID / BSSID

- System Penetration
Knowing how to find information in the online objective
Knowing how to find information in an objective on the network
Perform a scan on a target
How to use multiple tools together
Scan log vulnerabilities
Know how to take fingerprints
Exploit a vulnerability with Metasploit
How to extract information after exploration

- Hacking through the web
The steps for a SQLi vulnerability test
Data extraction with SQLi
Functions:
CONCAT
LOAD_FILE
UNION
SELECT
@@ VERSION
ORDER BY
LIMIT
Create a PoS XXS
Basic knowledge of i / c / w XSS hijacking sessions
How to bypass XSS filters
How an RFI works
Basic knowledge of php shells features such as r57 and c99
Differences between Bind & Back connect shells and how they work

Basic knowledge of computer science, Linux and security issues.

Participants will acquire knowledge useful and sufficient to evaluate the security in a computer or network system through the identification of vulnerabilities in a legal way.

In addition attendants will obtain the international Ethical Hacking certification.

Language: English
Type: Multiple answer
Exceeding threshold: 65% (24 correct answers)
Number of questions: 40
Time available: 90 minutes

Minimum hardware requirements:
CPU: dual core 64-bit on x86-64
RAM: 8gb (4GB for Host + 4GB for V.M.)
HDD / SSD: (40GB for V.M. Windows + 10GB for V.M. Linux)

Note: The course length is of 20 hours, including exercises and exam preparation. The classroom will consist of a maximum of 12 participants. The study hours required beyond the course are approximately 20, but may vary according to specific knowledge.

Request information

AND DOWNLOAD THE BROCHURE


Register with your profile:

Or fill in the fileds:

Share with:


Certifications Teachers

Certifications Area

CYBER SECURITY

CYBER SECURITY


By 2026, the cyber security market value will exceed $290 billion. In 2020, companies identified cyber crime as the major risk for business, while the World Economic Forum indicated it as the number 3 threat to global security. The number of profiles required will increase by 300%, due to the rise in cyber crime.

Check out also these courses of CYBER SECURITY

Digital training courses Geeks Academy

Blockchain: 4,9€ billion European investments by 2023

The value of the Cyber Security global market will be 300 billion in 2025.

13,4 million European Data Workers by 2028

REQUEST INFORMATION

Our Partner

powered by dunp