loading......

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Certified Security Expert

Please enter valid question or comment

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Nikhalesh

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

course photo

Certified Security Expert

Online Instructor led Course

Platform: Hangout

5,000

No Feedback Yet

No Reviews Yet
0 Interested

About the Course


This course is a great place to start your journey towards becoming a computer security expert. Gain the valuable skills you need to identify important weaknesses and provide effective computer security techniques that are important for any sized system.
In this course, students interested in learning ethical hacking techniques and penetration testing and who have basic IT skills, knowledge of Linux and Windows, and a basic knowledge of networking, can learn to find vulnerabilities and exploit systems as an ethical hacker.

Topics Covered

SECTION 1 COMPUTER BASICS & INTRODUCTION
SECTION 2 SETTING YOUR LAB
SECTION 3 ETHICAL HACKING - INFORMATION GATHERING
SECTION 4 ETHICAL HACKING - SYSTEM HACKING
SECTION 5 ETHICAL HACKING - WEB SERVER(SITE) HACKING
SECTION 6 Mobile & Wireless Security
SECTION 7 Advance Ethical Hacking
SECTION 8 Exam

Who should attend

Who should attend?
Students
IT Students & Professionals
Web Developers
Network Engineers
System Administrators
Law Professionals
Banking & finance Sector Professionals.

Pre-requisites

Basic IT skills
Basic knowledge of Linux and Windows

What you need to bring

Laptop Required

Key Takeaways

Over 26 lectures and 7 hours of content!
You will learn Kali Linux OS
You will learn Metasploit framework
You will learn exploiting a vulnerability with Metasploit framework
You will learn Client Side Attacks
You will learn making trojan file
You will learn creating and managing a botnet
You will learn hiding trojan file from antivirus programs
You will learn detecting trojans in your systems
You will learn capturing network traffics
You will learn data mining from captured network traffics
You will learn Arp poisoning attack
You will learn Dns spoof attack
Content
Reviews
There are no Reviews yet.
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet.

Date and Time

Not decided yet.

cash back100% Money Back Guarentee

About the Trainer

Nikhalesh SIngh

Information Security Analyst


Nikhalesh singh is a Security Ninja with over 5 Years experience in Ethical Hacking, Penetration Testing, Malware Reverse Engineering, Forensics, Securing Websites and Servers
Seats Left-

Students Interested 0

Course Id: 24127