Ethical Hacking and System Hardening
About This Course
This course aims to provide participants with a foundation in:
• Overview of ethical hacking and systematic attack framework
• How to use cybersecurity tools for footprinting and enumerating target systems
• How to use cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
• How to perform post-exploitation steps on exploited systems, such as password cracking and backdoor-access planting
• How to possibly apply countermeasures against attacks
At the end of the course, participants will be able to:
• Explain ethical hacking's objectives, stages, and available tools
• Utilize cybersecurity tools for footprinting and enumerating target systems
• Utilize cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
• Utilize cybersecurity tools for performing post-exploitation steps on exploited systems
• Explain and apply possible countermeasures against attacks
What You'll Learn
The module is targeted at those who need to plan and conduct a vulnerability assessment and penetration testing. Upon completing this module, they are able to plan and conduct tests and checks in order to determine if infrastructure components, systems, and application meet security requirements.
Entry Requirements
Basic cybersecurity, Linux Operating System, basic networking