15-19 June | Scanning network vulnerability | Online

Program: 17:30 – 20:30
Period: 15-19 June 2020
Vulnerability scanning is an inspection of the potential points of exploit on a computer or network to identify security holes. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. A scan may be performed by an organization’s IT department or a security service provide, possibly as a condition imposed by some authority. Vulnerability scans are also used by attackers looking for points of entry.
If the minimum number of participants is not met for a course, it will be rescheduled.
Module 1: Introduction to Information Security & Hacking Threats
Information Security World
Introduction to Hacking Terminologies
Elements of Information Security
Ethical Hackers
Types of Attacks on the Systems
Scope and Limitation on Ethical Hacking
Vulnerabilities and Vulnerability Research Tools
Understand Penetration Testing and Various Methods
Job Roles: Vulnerability-Admin, Vulnerability Assessment Analyst
Module 2: Foot printing
Introduction to Footprinting
Footprinting Threats
Smart Whois
DNS
Traceroute
Google Hacking, Website Mirroring, and Email Tracking
Mirroring Tools
Email tracking Methodology
Penetration Testing
Footprinting through Social Engineering
Module 3: Scanning Networks
Introduction to scanning
Understand Ping Sweep Techniques and Firewalk Tool
Gain knowledge on Nmap command switches
Different methods and techniques for Hacking
Vulnerability Scanning using BidiBlah and Other Hacking Tools
Understanding Proxy Servers in Launching an Attack and Anonymizers
Module 4: Enummeration
Learn the System Hacking Cycle
Introduction to Enumeration
Null Sessions and its Countermeasures
SNMP Enumeration and its Countermeasures
Enumeration Pen Testing
Course Features
- Lectures 0
- Quizzes 0
- Language Engleză
- Students 0
- Assessments Yes