NETWORK PENETRATION TESTING (2/2 Credits)
Learning Outcome:
On successful completion of this course, student will be able to: Define ethical hacking Methodology; Execute ethical hacking method with correct step; Assess vulnerabilities system with correct method.
Topics:
- Introduction to Hacking;
- Information Gathering;
- Target Enumeration;
- Vulnerability Assessment;
- Network Sniffing;
- Remote Exploitation;
- Client Side Exploitation;
- Post Exploitation;
- Web Hacking;
- Information Gathering;
- Enumeration;
- Web Enumeration;
- Quiz 1;
- Network Sniffing;
- Remote Exploitation Network;
- Remote Exploitation Applications;
- Client Side Exploitation;
- Post Exploitation;
- Web Hacking;
- Review;
- Quiz 2;
- Vulnerability Scoring;
- Report Writing.
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...