All Vskills Certification exams are ONLINE now. You may take from any where any time | Please use #TOGETHER for 20% discount

Certificate in White Hat Hacking

How It Works

  1. 1. Select Certification & Register
  2. 2. Receive a.) Online e Learning Access (LMS)    b.) Hard copy - study material
  3. 3. Take exam at chosen Date and Venue
  4. 4. Get certified & Increase Employability

Test Details

  • Duration: 60 minutes
  • No. of questions: 50
  • Maximum marks: 50, Passing marks: 25 (50%).
  • There is NO negative marking in this module.
  • 70 exam centres in India.

Benefits of Certification

Deliverables

Hard CopyPractice Test

Rs.3,999 /-

Why should I take White Hat Hacking certification?

If you want to become an white hat ethical hacker, an IT security professional or elevate your IT career then this course for you. Vskills certification for White Hat Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in white hat hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web-based attacks.

Certification includes 20 Hours of E-learning.

Study & Learn

  • Cryptography
  • Footprinting
  • Hacking
  • Social Engineering
  • Physical Security & Network Attacks

How will I benefit from White Hat Hacking certification?

White Hat Hacking and Security professionals are in great demand. Private and public companies are constantly hiring hackers for their testing and management of information security measures in a secured environment.

Companies that hire White Hat Hackers

Deloitte, Amazon India, Protivity, Fidelity, Tech Mahindra, Capgemini, Accenture

White Hat Hacking and Security Table of Contents

https://www.vskills.in/certification/White-Hat-Hacking-Table-of-Contents

White Hat Hacking and Security Tutorial

https://www.vskills.in/certification/tutorial/information-technology/certificate-white-hat-hacking/

White Hat Hacking and Security Sample Questions

https://www.vskills.in/certification/White-Hat-Hacking-Sample-Questions

White Hat Hacking and Security Mock Test

http://www.vskills.in/practice/quiz/Ethical-Hacking

Apply for  White Hat Hacking and Security Certification

By Net banking / Credit Card/Debit Card

We accept Visa/Master/Amex cards and all Indian Banks Debit Cards. There is no need to fill application form in case you are paying online.

Please click buy now to proceed for online payments.

  • Visa Card
  • Master Card
  • American Express
TABLE OF CONTENT

Introduction

  • Ethical Hacking Evolution and Hacktivism
  • Need and Technical Terms
  • Skills Needed and Stages of Hacking
  • Ethical Hacking Modes
  • Networking Basics
  • Penetration Testing

Ethics

  • Moral Direction and Hacker Ethics Principles
  • Security Grey Areas
  • Cyber Laws (IT Act, etc.)
  • Rules of Engagement

Cryptography

  • Cryptography Basics
  • Evolution and Data Encryption Methods
  • Symmetric and Asymmetric key Cryptography
  • Private and Public Key Exchange
  • Stream and Block Ciphers
  • Secret Key Cryptography
  • Message Authentication and Hash Functions
  • Digital Signatures and Public Key Infrastructure

Footprinting

  • Information Gathering
  • DNS, whois and ARIN records
  • Using traceroute, e-mail tracking and web spider
  • Google Hacking

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Types
  • Countermeasures for Social Engineering

Physical Security

  • Basics and Need
  • Physical Security Countermeasures

Network Scanning and Enumeration

  • Network Scanning Techniques
  • Scanners and Analyzers
  • HTTP tunneling and IP spoofing
  • Enumerating null sessions and SNMP enumeration

Network Attacks

  • TCP/IP Packet Formats and Ports
  • Firewall and IDS
  • Switch Attacks
  • Router Attacks
  • DoS, DDoS, Session Hijacking

Wireless Networks

  • Wireless LAN Basics
  • WLAN Security
  • WLAN Attacks
  • WLAN Attack Countermeasures

System Hacking

  • Password Attacks, Vulnerabilities and Countermeasure
  • Spyware
  • Rootkit
  • Steganography
  • Trojans
  • Computer worm
  • Backdoor
  • Buffer Overflow

Windows Hacking

  • Memory and Process
  • Windows Architecture
  • Windows Security
  • Windows Attacks
  • Countermeasures
  • Windows Memory Protection, SEH and OllyDbg

Linux Hacking

  • Linux Basics
  • Linux Threats
  • Linux Security
  • Kernel Patching

Web Hacking

  • Web Basics
  • Web Server Attacks
  • Web Application Attacks
  • VoIP Attacks

Emerging Trends

  • Cloud Computing and Security
  • Identity Access Management
  • Security Policies
  • Mobile Security
  • New Threats

Write a review

Please login or register to review