Why should I take Ethical Hacking certification?

If you want to become an ethical hacker, an IT security professional or elevate your IT career then this course for you. Vskills certification for Ethical Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in ethical hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web-based attacks.

Study & Learn

  • Cryptography
  • Footprinting
  • Hacking
  • Social Engineering
  • Physical Security & Network Attacks

How will I benefit from Ethical Hacking certification?

Ethical Hacking and Security professionals are in great demand. Private and public companies are constantly hiring ethical hackers for their testing and management of information security measures in a secured environment.

Companies that hire Ethical Hackers

Deloitte, Amazon India, Protivity, Fidelity, Tech Mahindra, Capgemini, Accenture

Ethical Hacking and Security Table of Contents

https://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional-Table-of-Contents

Ethical Hacking and Security Tutorial

https://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional-Learning-Resources

Ethical Hacking and Security Sample Questions

https://www.vskills.in/certification/Certified-Ethical-Hacking-and-Security-Professional-Sample-Questions

Ethical Hacking and Security Mock Test

http://www.vskills.in/practice/quiz/Ethical-Hacking

Apply for  Ethical Hacking and Security Certification

By Net banking / Credit Card/Debit Card

We accept Visa/Master/Amex cards and all Indian Banks Debit Cards. There is no need to fill application form in case you are paying online.

Please click buy now to proceed for online payments.

  • Visa Card
  • Master Card
  • American Express
TABLE OF CONTENT

Introduction

  • Ethical Hacking Evolution and Hacktivism
  • Need and Technical Terms
  • Skills Needed and Stages of Hacking
  • Ethical Hacking Modes
  • Networking Basics
  • Penetration Testing

Ethics

  • Moral Direction and Hacker Ethics Principles
  • Security Grey Areas
  • Cyber Laws (IT Act, etc.)
  • Rules of Engagement

Cryptography

  • Cryptography Basics
  • Evolution and Data Encryption Methods
  • Symmetric and Asymmetric key Cryptography
  • Private and Public Key Exchange
  • Stream and Block Ciphers
  • Secret Key Cryptography
  • Message Authentication and Hash Functions
  • Digital Signatures and Public Key Infrastructure

Footprinting

  • Information Gathering
  • DNS, whois and ARIN records
  • Using traceroute, e-mail tracking and web spider
  • Google Hacking

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Types
  • Countermeasures for Social Engineering

Physical Security

  • Basics and Need
  • Physical Security Countermeasures

Network Scanning and Enumeration

  • Network Scanning Techniques
  • Scanners and Analyzers
  • HTTP tunneling and IP spoofing
  • Enumerating null sessions and SNMP enumeration

Network Attacks

  • TCP/IP Packet Formats and Ports
  • Firewall and IDS
  • Switch Attacks
  • Router Attacks
  • DoS, DDoS, Session Hijacking

Wireless Networks

  • Wireless LAN Basics
  • WLAN Security
  • WLAN Attacks
  • WLAN Attack Countermeasures

System Hacking

  • Password Attacks, Vulnerabilities and Countermeasure
  • Spyware
  • Rootkit
  • Steganography
  • Trojans
  • Computer worm
  • Backdoor
  • Buffer Overflow

Windows Hacking

  • Memory and Process
  • Windows Architecture
  • Windows Security
  • Windows Attacks
  • Countermeasures
  • Windows Memory Protection, SEH and OllyDbg

Linux Hacking

  • Linux Basics
  • Linux Threats
  • Linux Security
  • Kernel Patching

Web Hacking

  • Web Basics
  • Web Server Attacks
  • Web Application Attacks
  • VoIP Attacks

Emerging Trends

  • Cloud Computing and Security
  • Identity Access Management
  • Security Policies
  • Mobile Security
  • New Threats
“Exam scheduling to be done through user account” / “Exam once scheduled cannot be cancelled”
Date of Examination
02-Dec-2017
03-Dec-2017
16-Dec-2017
17-Dec-2017
06-Jan-2018
07-Jan-2018
20-Jan-2018
21-Jan-2018
03-Feb-2018
04-Feb-2018
17-Feb-2018
18-Feb-2018
03-Mar-2018
04-Mar-2018
17-Mar-2018
18-Mar-2018
Examination Time
01:00 PM - 02:00 PM
02:30 PM - 03:30 PM
04:00 PM - 05:00 PM
05:30 PM - 06:30 PM
10:00 AM - 11:00 AM
11:30 AM - 12:30 PM

Write a review


Your Name


Your Review Note: HTML is not translated!

Rating Bad           Good

Captcha

Write a review

Note: HTML is not translated!
    Bad           Good


Captcha

Tags: Ethical Hacking And Security Course, It Security And Ethical Hacking Certification, Security, Hack, Hacking, Ethical Hacking, Network Security, Software Security, Cyber Security, Systems Security, Systems Hacking, Windows Hacking, Web Security, Internet Security, Programming, Computing, C, C++, Java, Cyber Crime