Why should I take White Hat Hacking certification?
If you want to become an white hat ethical hacker, an IT security professional or elevate your IT career then this course for you. Vskills certification for White Hat Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in white hat hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web-based attacks.
Certification includes 20 Hours of E-learning.
Study & Learn
- Cryptography
- Footprinting
- Hacking
- Social Engineering
- Physical Security & Network Attacks
How will I benefit from White Hat Hacking certification?
White Hat Hacking and Security professionals are in great demand. Private and public companies are constantly hiring hackers for their testing and management of information security measures in a secured environment.
Companies that hire White Hat Hackers
Deloitte, Amazon India, Protivity, Fidelity, Tech Mahindra, Capgemini, Accenture
White Hat Hacking and Security Table of Contents
https://www.vskills.in/certification/White-Hat-Hacking-Table-of-Contents
White Hat Hacking and Security Tutorial
https://www.vskills.in/certification/tutorial/information-technology/certificate-white-hat-hacking/
White Hat Hacking and Security Sample Questions
https://www.vskills.in/certification/White-Hat-Hacking-Sample-Questions
White Hat Hacking and Security Mock Test
http://www.vskills.in/practice/quiz/Ethical-Hacking
Apply for White Hat Hacking and Security Certification
By Net banking / Credit Card/Debit Card
We accept Visa/Master/Amex cards and all Indian Banks Debit Cards. There is no need to fill application form in case you are paying online.
Please click buy now to proceed for online payments.
TABLE OF CONTENT
Introduction
- Ethical Hacking Evolution and Hacktivism
- Need and Technical Terms
- Skills Needed and Stages of Hacking
- Ethical Hacking Modes
- Networking Basics
- Penetration Testing
Ethics
- Moral Direction and Hacker Ethics Principles
- Security Grey Areas
- Cyber Laws (IT Act, etc.)
- Rules of Engagement
Cryptography
- Cryptography Basics
- Evolution and Data Encryption Methods
- Symmetric and Asymmetric key Cryptography
- Private and Public Key Exchange
- Stream and Block Ciphers
- Secret Key Cryptography
- Message Authentication and Hash Functions
- Digital Signatures and Public Key Infrastructure
Footprinting
- Information Gathering
- DNS, whois and ARIN records
- Using traceroute, e-mail tracking and web spider
- Google Hacking
Social Engineering
- Social Engineering Concepts
- Social Engineering Attack Types
- Countermeasures for Social Engineering
Physical Security
- Basics and Need
- Physical Security Countermeasures
Network Scanning and Enumeration
- Network Scanning Techniques
- Scanners and Analyzers
- HTTP tunneling and IP spoofing
- Enumerating null sessions and SNMP enumeration
Network Attacks
- TCP/IP Packet Formats and Ports
- Firewall and IDS
- Switch Attacks
- Router Attacks
- DoS, DDoS, Session Hijacking
Wireless Networks
- Wireless LAN Basics
- WLAN Security
- WLAN Attacks
- WLAN Attack Countermeasures
System Hacking
- Password Attacks, Vulnerabilities and Countermeasure
- Spyware
- Rootkit
- Steganography
- Trojans
- Computer worm
- Backdoor
- Buffer Overflow
Windows Hacking
- Memory and Process
- Windows Architecture
- Windows Security
- Windows Attacks
- Countermeasures
- Windows Memory Protection, SEH and OllyDbg
Linux Hacking
- Linux Basics
- Linux Threats
- Linux Security
- Kernel Patching
Web Hacking
- Web Basics
- Web Server Attacks
- Web Application Attacks
- VoIP Attacks
Emerging Trends
- Cloud Computing and Security
- Identity Access Management
- Security Policies
- Mobile Security
- New Threats