Exclusive Deal! 94% Off, Today Only!
Buy 1 or more contact sale
Learn to reach your full potential by taking our IT: Ethical Hacking & IT Security and leap up the career ladder of your choice. You can become quickly skilled in the field by enrolling in this bestselling course and stand proudly above applicants and candidates as you impress your future employer.
IT: Ethical Hacking & IT Security has been especially designed by industry experts and specialists to rapidly coach learners just like you and help you succeed in your ambitions. We are committed to supporting you all the way and our dedicated staff will be available 24/7 to answer any queries or resolve technical problems. The learning modules are small but intensive and crafted to help you gain the maximum knowledge in the minimum time. IT: Ethical Hacking & IT Security course will come with a certificate endorsed by The Quality Licence Scheme and allow you to study anywhere and at any time. We work to your requirements, not the other way round. Let us help you by accepting our gift of learning with IT: Ethical Hacking & IT Security and a high-flying job in a relevant field could soon be yours.Â
The IT: Ethical Hacking & IT Security has been specially designed for motivated learners who are looking to add a new skill to their CV and stand head and shoulders above the competition. Learn the latest industry-specific information with the IT: Ethical Hacking & IT Security. Enrol on the IT: Ethical Hacking & IT Security and learn a new skill from anywhere, at any time!Â
Enrol on the IT: Ethical Hacking & IT Security with no formal entry requirements! If you have a passion for knowledge and want to learn something new, register on the IT: Ethical Hacking & IT Security without any delay. We only ask that all students have a passion for learning and literacy, and be over the age of 16. Complete the IT: Ethical Hacking & IT Security online from your computer, tablet, or smartphone, and learn in a way that suits you.Â
An endorsed certificate will be issued for the learners as proof of their achievement after the completion of this course.
After successful course completion, learners will be able to order an endorsed certificate as proof of their new achievement. Only for £139 you can order and get endorsed certificates delivered to your home. International students have to pay an extra £10 as a postage charge.Â
The learners have to successfully complete the assessment of this course to achieve the CPD certificate. Digital certificates can be ordered for only £10. The learner can purchase printed hard copies inside the UK for £29, and international students can purchase printed hard copies for £39.Â
This course has been endorsed by the Quality Licence Scheme for its high-quality, non-regulated provision and training programmes. This course is not regulated by Ofqual and is not an accredited qualification. Academy for Health & Fitness will be able to advise you on any further recognition, for example, progression routes into further and/or higher education. For further information please visit the Learner FAQs on the Quality Licence Scheme website.Â
You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass the exam and to achieve Quality Licence Scheme endorsed certificates.
Our expert trainers will assess your assignment and give you feedback after you submit the assignment.
Introduction to Ethical Hacking | |||
What is an Ethical Hacker | 00:07:00 | ||
Terminology Crash Course pt. 1 | 00:09:00 | ||
Terminology Crash Course pt. 2 | 00:13:00 | ||
Terminology Crash Course pt. 3 | 00:08:00 | ||
Legal Considerations | 00:11:00 | ||
Reconnaissance - Surveying the Attack Surface | |||
Surveying the Attack Surface | 00:10:00 | ||
Recon Types | 00:08:00 | ||
Passive Recon Part 1 | 00:07:00 | ||
Passive Recon Part 2 | 00:10:00 | ||
Active Recon | 00:15:00 | ||
Recon Walkthrough Tools Summary | 00:14:00 | ||
Maltego Demo | 00:07:00 | ||
FOCA Demo | 00:05:00 | ||
DEMO – Harvester | 00:02:00 | ||
Scanning and Enumeration - Getting Down to Business | |||
Scanning & enumeration | 00:08:00 | ||
Identifying Active Hosts pt. 1 | 00:10:00 | ||
Identifying Active Hosts pt. 2 | 00:13:00 | ||
Identifying Active Services | 00:18:00 | ||
OS and Services Fingerprinting | 00:15:00 | ||
Network Mapping | 00:10:00 | ||
Final Thoughts | 00:05:00 | ||
DEMO – Nmap Syntax pt. 1 | 00:14:00 | ||
DEMO – Nmap Syntax pt. 2 | 00:16:00 | ||
DEMO – Nmap Hosts Discovery | 00:12:00 | ||
DEMO – Nmap Service Discovery | 00:17:00 | ||
DEMO – Nmap Scripts | 00:11:00 | ||
DEMO – Masscan | 00:11:00 | ||
Network Presence | |||
Network Insecurity | 00:04:00 | ||
Sniffing and Spoofing | 00:13:00 | ||
Sniffing Tools | 00:09:00 | ||
Spoofing, Crypto and Wifi | 00:15:00 | ||
DEMO – tcpdump | 00:11:00 | ||
DEMO – Wireshark | 00:11:00 | ||
DEMO – Ettercap | 00:13:00 | ||
DEMO – Burp Suite | 00:15:00 | ||
DEMO – Scapy | 00:10:00 | ||
Attacking | |||
Security Overview pt. 1: Windows Architecture | 00:18:00 | ||
Security Overview pt. 2: Credentials Security | 00:16:00 | ||
Security Overview pt. 3: Memory Corruption and Exploitation | 00:16:00 | ||
Windows Hacking Basics | 00:20:00 | ||
Local Access and Privilege Escalation | 00:20:00 | ||
Dumping Hashes and Cracking Passwords | 00:18:00 | ||
Linux Attacking Basics pt. 1 | 00:13:00 | ||
Linux Attacking Basics pt. 2 | 00:14:00 | ||
References | 00:08:00 | ||
DEMO – Windows MSF Exploit pt. 1 | 00:13:00 | ||
DEMO – Windows MSF Exploit pt. 2 | 00:15:00 | ||
DEMO – Post Exploitation Activities | 00:13:00 | ||
DEMO – Mimikatz | 00:07:00 | ||
DEMO – Hashcat | 00:08:00 | ||
DEMO – Konboot | 00:13:00 | ||
DEMO – Post Exploitation Windows CMD | 00:14:00 | ||
DEMO – Post Exploitation Windows Powershell | 00:13:00 | ||
DEMO – Attacking Linux targets pt. 1 | 00:10:00 | ||
DEMO – Attacking Linux targets pt. 1 | 00:13:00 | ||
Web Hacking | |||
Introduction to Web Hacking | 00:03:00 | ||
Web Security Architecture Overview pt. 1 | 00:17:00 | ||
Web Security Architecture Overview pt. 2 | 00:12:00 | ||
Attacking the Web Server pt. 1 | 00:10:00 | ||
Attacking the Web Server pt. 2 | 00:11:00 | ||
Attacking the Platform pt. 1 | 00:19:00 | ||
Attacking the Platform pt. 2 | 00:08:00 | ||
Attacking the Technology pt. 1 | 00:21:00 | ||
Attacking the Technology pt. 2 | 00:17:00 | ||
OWASP Top 10 pt. 1 | 00:09:00 | ||
OWASP Top 10 pt. 2 | 00:21:00 | ||
Attacking the Business Logic pt. 1 | 00:11:00 | ||
Attacking the Business Logic pt. 2 | 00:15:00 | ||
Tools and Methodology | 00:20:00 | ||
References | 00:05:00 | ||
DEMO – OWASP Mutillidae | 00:09:00 | ||
SQLI | 00:07:00 | ||
SQL Map Intro | 00:08:00 | ||
SQL Map | 00:25:00 | ||
DEMO – Burpsuite | 00:37:00 | ||
DEMO – Burpsuite XSS Hunter | 00:16:00 | ||
DEMO – mitmproxy | 00:10:00 | ||
DEMO – Skipfish pt.1 | 00:04:00 | ||
DEMO – Skipfish pt.2 | 00:04:00 | ||
Social Engineering - Hacking Humans | |||
Social Engineering Basics | 00:15:00 | ||
Social Engineering Methods | 00:16:00 | ||
Tools and Techniques pt. 1 | 00:15:00 | ||
Tools and Techniques pt. 2 | 00:12:00 | ||
Tools and Techniques pt. 3 | 00:09:00 | ||
Physical Security Considerations | 00:13:00 | ||
Final Thoughts | 00:11:00 | ||
DEMO – Credential harvesting | 00:02:00 | ||
DEMO – Website cloning | 00:06:00 | ||
DEMO – Automating an attack | 00:03:00 | ||
DEMO – Anti-virus evasion pt. 1 | 00:08:00 | ||
DEMO – Anti-virus evasion pt. 2 | 00:12:00 | ||
Assignment | |||
Assignment – IT: Ethical Hacking & IT Security | 3 weeks, 3 days | ||
Order Your Certificate | |||
Claim Your QLS Certificate | 00:00:00 |
3672
4.3
£25