Please accept cookies to help us improve this website Is this OK? Yes No More on cookies »
Item number: 136058272

Ethical Hacker v11 Live Labs

Item number: 136058272

Ethical Hacker v11 Live Labs

116,00 140,36 Incl. tax

Order online the best Practice Labs Live Labs Ethical Hacker v11 and start today.

Read more
Availability:
In stock
Delivery time:
Ordered before 5 p.m.! Start today.
  • Award Winning E-learning
  • Lowest price guarantee
  • Personalized service by our expert team
  • Pay safely online or by invoice
  • Order and start within 24 hours

Order the best Practice Labs / Live labs online now Ethical Hacker v11 and start today

The Ethical Hacker Practice Lab gives users the opportunity to gain hands-on experience of the skills required to perform key ethical hacking procedures.

Ethical hacking (also known as penetration testing) is a simulated cyber attack designed to exploit security vulnerabilities within a network and systems. Individuals conducting ethical hacking locate those vulnerabilities and attempt to exploit them. For example, this might involve breaching web applications, protocols, Application Programming Interfaces (APIs), servers and firewalls, plus anything else on a network that could be open to potential exploitation.

The objective is to identify vulnerabilities that could be targeted by a malicious agent and exploit those vulnerabilities to simulate the damage that might be caused. In the workplace, this intelligence is used to mitigate the effects of a cyber attack and to inform changes to security policies, procedures and infrastructure.

Modules

  • Ethical Hacking Concepts
  • Footprinting & Reconnaissance - Part 1
  • Footprinting & Reconnaissance - Part 2
  • Network Resource Discovery Methods - Part 1
  • Network Resource Discovery Methods - Part 2
  • NetBIOS, SNMP & LDAP Network Enumeration
  • NTP, DNS & Other Network Enumeration Techniques & Countermeasures
  • Vulnerability Assessment Tools and Techniques
  • System Hacking & Manipulation
  • Implementing Malware Concepts
  • Network Sniffing Techniques & Attacks
  • Social Engineering Exploits
  • Denial of Services Techniques & Attacks
  • Session Hijacking Implementation & Prevention
  • Compromising Web Servers
  • Web Application Exploitation Concepts
  • Web Application Exploitation Attacks - Part 1
  • Web Application Exploitation Attacks - Part 2
  • Compromising SQL Injection Attacks
  • Exploiting Wireless Vulnerabilities
  • Compromising & Exploiting Mobile Devices
  • Compromising IoT & OT platforms
  • Introduction to Cloud Computing Vulnerabilities
  • Cryptographic Concepts, Implementation & Detection
Language English
Lesson duration Variable
Online access 365 days
Service via chat, telephone and e-mail

There are no reviews written yet about this product.

Loading...

OEM Office Elearning Menu Trots Genomineerd voor 'Beste Opleider van Nederland'

OEM Office Elearning Menu is vereerd met de nominatie voor 'Beste Opleider van Nederland' door Springest by STUDYTUBE, een blijk van erkenning voor onze excellente trainingen en toewijding aan kwaliteitsonderwijs. Dank aan alle cursisten.

Reviews

There are no reviews written yet about this product.

25.000+

Deelnemers getrained

Springest: 9.1 - Edubookers 8.9

Gemiddeld cijfer

3500+

Aantal getrainde bedrijven

20+

Jaren ervaring

Even more knowledge

Read our most recent articles

View blog