Download pdf - CERTIFIED ETHICAL HACKER

Transcript
Page 1: CERTIFIED ETHICAL HACKER

C E RT I F I E DE T H I C A L H AC K E R

WHAT ISETHICAL HACKING

ETHICAL HACKINGLANDSCAPE

C E RT I F I E DC E RT I F I E DE T H I C A L H AC K E RE T H I C A L H AC K E R

JOBS IN THE SEGMENT

...And many more

Hacking is trying to gain unauthorized entry into any

network or system with the intention of stealing

information or making money. When this entry in

any system or network is authorized based on

permissions taken from requisite authorities then it

is called as Ethical Hacking and such people who

hack into the system with permissions without any

malicious intent are called as Ethical Hackers.

As per the report by security solutions provider

Symantec, India continues to be second most

impacted by spam and bots, third most impacted

by network attacks, and fourth most impacted by

ransomware. The report also pointed out that with

the threat landscape becoming more diverse,

attackers are working harder to discover new

avenues of attack and cover their tracks while

doing so.

SecurityConsultant

SecurityArchitect

SecurityAdministrator

SecurityAnalyst

Page 2: CERTIFIED ETHICAL HACKER

Ethical Hacking• Introduction to Ethical Hacking

• Information gathering using

Footprinting and Reconnaissance

• Network Scanning techniques

• Enumeration and countermeasures

• Vulnerability Assessment

• Hacking Systems

• Malware Threats

• Packet sniffing techniques

• Social Engineering and countermeasures

• Denial of Services and Buffer Overflows

ETHICAL HACKING

WINDOWS 10 (MD-100)

C E R T I F I E D E T H I C A L H A C K E R

• Session hijacking techniques and countermeasures

• Web server Hacking and countermeasures

• Web applications Hacking and countermeasures

• SQL injection attacks and detection

• Wireless Hacking and Security

• Mobile Hacking

• Evading IDS, firewall and honeypots and

countermeasures

• Hacking IoT devices

• Cloud computing threats and security techniques

• Cryptography

• Basics of penetration testing

• Project

Jetking Certified Ethical HackingExam & Certificate

ETHICAL HACKING

Disclaimer and Terms & Conditions:

• The course content may change without any prior information.

• Syllabus is only mapped to Global Certifications. Student shall receive a Jetking certification on completion of course.

• Global Certification & exam Voucher is not included in the course.

$ $$

$ $$


Recommended