Ethical Hacking & Penetration Testing (Module #2) - Social Engineering and Trojans

Provided by

About the course

Ethical Hacking & Penetration Testing (Module #2) - Social Engineering and Trojans:

Kali Linux, previously known as Backtrack was founded in 2006. It became famous with Backtrack 5, the most popular pentesting live CD. Later, it was relaunched with Kali Linux 1.0, and now officially as Kali Linux 2.0 Sana in 2015 with even GNOME 3 user interface. Kali Linux is developed and maintained by Offensive security pvt.Ltd.
Through this course you will learn about Nmap and ZenMap, The Harvester, WHOIS and dnsenum, Urlcrazy and dnsdict6, Dnsrecon, Dnsmapping, Introduction, Types of Social Engineering, Social Engineering attacks, Spear-phishing Attack, Phishing Attack, Mass mailer Attack, Types of Computer Malwares, Dangerous viruses of all time, Installing Rootkit Hunter, command prompt backdoor, Backdoor – Gaining Access, Backdoor – Maintaining Access.

Target Customers:

  • Basic understanding of computers and the internet.
  • Basic knowledge about software and their terms.
  • A passion to learn and interest in IT.
  • A desire to expand your knowledge about coding and IT in general.

Pre-Requisites:

  • HTML and CSS (would be required when modifying website source html files).
  • Working with Terminals and Command lines.
  • Scripting in bash using Shell and batch files.
  • Basics in either Python, C or Java.

However, none of the above are the pre-requisites and a person knowing only how to install operating systems and a tendency to solve problems can also become a master in Kali Linux Training.

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...