Certificate in White Hat Hacking

How It Works

  1. 1. Select Certification & Register
  2. 2. Receive Online e-Learning Access (LMS)
  3. 3. Take exam online anywhere, anytime
  4. 4. Get certified & Increase Employability

Test Details

  • Duration: 60 minutes
  • No. of questions: 50
  • Maximum marks: 50, Passing marks: 25 (50%).
  • There is NO negative marking in this module.
  • Online exam.

Benefits of Certification


$49.00 /-
Download Brochure

Why should I take White Hat Hacking certification?

If you want to become an white hat ethical hacker, an IT security professional or elevate your IT career then this course for you. Vskills certification for White Hat Hacking and Security Professional assesses the candidate for testing and managing company’s information security. The certification tests the candidates on various areas in white hat hacking and security which includes knowledge of ethics and countermeasures for attacks on system, network (wired and wireless), operating system (Windows and Linux) and web-based attacks.

Study & Learn

  • Cryptography
  • Foot printing
  • Hacking
  • Social Engineering
  • Physical Security & Network Attacks

How will I benefit from White Hat Hacking certification?

White Hat Hacking and Security professionals are in great demand. Private and public companies are constantly hiring hackers for their testing and management of information security measures in a secured environment.

White Hat Hacking and Security Table of Contents

https://www.vskills.in/certification/white-hat-hacking-table-of-contents

White Hat Hacking and Security Tutorial

https://www.vskills.in/certification/tutorial/information-technology/certificate-white-hat-hacking/

White Hat Hacking and Security Sample Questions

https://www.vskills.in/certification/white-hat-hacking-sample-questions

White Hat Hacking and Security Practice Test

http://www.vskills.in/practice/ethical-hacking

White Hat Hacking Interview Questions

https://www.vskills.in/interview-questions/security-interview-questions/white-hat-hacking-interview-questions

Companies that hire White Hat Hackers

Vskills certified professionals will find job opportunities in top companies like Tech Mahindra, TCS, Deloitte, Amazon, Protivity, Mphasis, Accenture, Wipro, Fidelity, Tech Mahindra, Capgemini, Accenture.

White Hat Hacking Blogs

Update your knowledge on white hat hacking with our latest online blogs.

White Hat Hacking Jobs

Checkout the various job openings for White Hat Hacking, click here..

White Hat Hacking Internships

Vskills runs its flagship internship programme where bright interns work with academic council, click to know more details..

Apply for  White Hat Hacking and Security Certification

By Net banking / Credit Card/Debit Card

We accept Visa/Master/Amex cards and all Indian Banks Debit Cards. There is no need to fill application form in case you are paying online.

Please click buy now to proceed for online payments.

  • Visa Card
  • Master Card
  • American Express
TABLE OF CONTENT

Introduction

  • Ethical Hacking Evolution and Hacktivism
  • Need and Technical Terms
  • Skills Needed and Stages of Hacking
  • Ethical Hacking Modes
  • Networking Basics
  • Penetration Testing

Ethics

  • Moral Direction and Hacker Ethics Principles
  • Security Grey Areas
  • Cyber Laws (IT Act, etc.)
  • Rules of Engagement

Cryptography

  • Cryptography Basics
  • Evolution and Data Encryption Methods
  • Symmetric and Asymmetric key Cryptography
  • Private and Public Key Exchange
  • Stream and Block Ciphers
  • Secret Key Cryptography
  • Message Authentication and Hash Functions
  • Digital Signatures and Public Key Infrastructure

Footprinting

  • Information Gathering
  • DNS, whois and ARIN records
  • Using traceroute, e-mail tracking and web spider
  • Google Hacking

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Attack Types
  • Countermeasures for Social Engineering

Physical Security

  • Basics and Need
  • Physical Security Countermeasures

Network Scanning and Enumeration

  • Network Scanning Techniques
  • Scanners and Analyzers
  • HTTP tunneling and IP spoofing
  • Enumerating null sessions and SNMP enumeration

Network Attacks

  • TCP/IP Packet Formats and Ports
  • Firewall and IDS
  • Switch Attacks
  • Router Attacks
  • DoS, DDoS, Session Hijacking

Wireless Networks

  • Wireless LAN Basics
  • WLAN Security
  • WLAN Attacks
  • WLAN Attack Countermeasures

System Hacking

  • Password Attacks, Vulnerabilities and Countermeasure
  • Spyware
  • Rootkit
  • Steganography
  • Trojans
  • Computer worm
  • Backdoor
  • Buffer Overflow

Windows Hacking

  • Memory and Process
  • Windows Architecture
  • Windows Security
  • Windows Attacks
  • Countermeasures
  • Windows Memory Protection, SEH and OllyDbg

Linux Hacking

  • Linux Basics
  • Linux Threats
  • Linux Security
  • Kernel Patching

Web Hacking

  • Web Basics
  • Web Server Attacks
  • Web Application Attacks
  • VoIP Attacks

Emerging Trends

  • Cloud Computing and Security
  • Identity Access Management
  • Security Policies
  • Mobile Security
  • New Threats

Write a review

Please login or register to review

 For Support