NETWORK PENETRATION TESTING (2/2 Credits)
Learning Outcomes:
On successful completion of this course, student will be able to:
- Define ethical hacking Methodology
- Execute ethical hacking method with correct step
- Assess vulnerabilities system with correct method
Topics:
- Introduction to Hacking
- Information Gathering
- Target Enumeration
- Vulnerability Assessment
- Network Sniffing
- Remote Exploitation
- Client Side Exploitation
- Post Exploitation
- Web Hacking
- Information Gathering
- Enumeration
- Web Enumeration
- Quiz 1
- Network Sniffing
- Remote Exploitation Network
- Remote Exploitation Applications
- Client Side Exploitation
- Post Exploitation
- Web Hacking
- Review
- Quiz 2
- Vulnerability Scoring
- Report Writing
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...