Ethical Hacking and System Hardening

Training Provider: NATIONAL UNIVERSITY OF SINGAPORE
Course Reference: TGS-2022012263
S$855
Original: S$2,850
Save S$1,995

About This Course

This course aims to provide participants with a foundation in:
• Overview of ethical hacking and systematic attack framework
• How to use cybersecurity tools for footprinting and enumerating target systems
• How to use cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
• How to perform post-exploitation steps on exploited systems, such as password cracking and backdoor-access planting
• How to possibly apply countermeasures against attacks

At the end of the course, participants will be able to:

• Explain ethical hacking's objectives, stages, and available tools
• Utilize cybersecurity tools for footprinting and enumerating target systems
• Utilize cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
• Utilize cybersecurity tools for performing post-exploitation steps on exploited systems
• Explain and apply possible countermeasures against attacks

What You'll Learn

In our increasingly digitalised world, cyberthreats and cyberattacks are also alarmingly on the rise. Ethical hacking helps security professionals systematically footprint, enumerate, scan, and test-exploit their own systems. Based on the identified system weaknesses, the professionals can subsequently secure their systems by hardening the systems against future attacks. This practice-oriented module demonstrates how cyberattacks can target hosts, networks, and web servers. It also demonstrates how the target systems can subsequently be hardened. With its hands-on approach, the module puts cybersecurity knowledge and concepts into practice by employing various offensive and defensive tools in attacking and defending systems, respectively. The participants will learn practical skills in conducting ethical hacking based on an attack methodology so as to discover weaknesses of target systems. For possible attacks, countermeasures are explained and hardening mechanisms can be applied. Topics covered include systematic attack methodology, system attacks, network attacks, and web attacks.

The module is targeted at those who need to plan and conduct a vulnerability assessment and penetration testing. Upon completing this module, they are able to plan and conduct tests and checks in order to determine if infrastructure components, systems, and application meet security requirements.

Entry Requirements

Basic cybersecurity, Linux Operating System, basic networking

Course Details

Duration 21 hours
Language English
Training Commitment Not specified
Total Enrolled 86 students
Back to All Courses
Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.

More Courses from NATIONAL UNIVERSITY OF SINGAPORE

Objectives: At the end of the programme, participants are expected to achieve the following objecti...
Duration 7.5 hours
Fee After Subsidy S$285
Objectives: At the end of the programme, participants are expected to achieve the following objecti...
Duration 7.5 hours
Fee After Subsidy S$475
The programme is designed to transform Chinese language educators into impactful leaders equipped to...
Duration 77 hours
Fee After Subsidy S$2,550