Hacking Techniques & IT Security (Module #1) - The Fundamentals

Provided by

  • Specialism Ethical Hacker
  • Certifications Other
  • Location United Kingdom
  • Study type Online
  • Course Type Short (less than 3 months)
  • Duration online self paced LIFETIME ACCESS
  • Price Price on Request

Enquire about this course

About the course

Hacking Techniques & IT Security (Module #1) - The Fundamentals:

Hacking is the process of finding loopholes in a website, intrude into it and take control of the site or make it crash. To prevent malicious hackers from intruding into computer systems and networks causing severe harm, trained hackers are employed by companies to find loopholes or weaknesses in existing websites, computer networks and take measures to solve them. It is called ethical hacking.

Through this course you will be learning about its concept, port scanning, ICMP scanning, hacking NetBIOS with example, internet application security and venerability, introduction to attack techniques and classes of attacks, discussion about protecting online identity, tips for protecting online identity, reducing risk of online identity theft, action needed when identity theft, introduction to phishing, types of phishing and antiphishing level, antiphis, internet phishing introduction, phishing link and website manipulation, phone phishing, how to protect yourself from phishing, antiphishing approaches and lastly about summary of anti-phis approaches.

Course Objective:

  • Learn in depth about general hacking methods & protect online identity
  • Learn in detail what is internet phishing & anti-phishing

Target Customers:

  • Students
  • Professionals in software
  • Academies / Institutes who impart training in hacking to IT officials.

Pre-Requisites:

  • Basic computer knowledge
  • Software skills
  • Networking technology
  • Internet and intuitive problem solving ability

Enquire

Start date Location / delivery
No fixed date Online

Related article

Adrian Adair, Operations Direction at Morson International , explains how the exponential growth of IT has transformed the cyber security industry ...