Ethical Hacking [System Security and Web Penetration]

Current Status
Not Enrolled
Get Started
This course is currently closed

Free Ethical Hacking Clipart in AI, SVG, EPS or PSD

About this course

The entire cyber-infrastructure is built upon the World Wide Web. At the heart of this global village lies a combination of two computing systems with a connecting medium, also known as a computer network. But have you ever thought of this – Is the infrastructure worthy enough to gain access to your personal information? Is the cloud secure enough for you to load your photographs? Today, developers, scientists, influencers, everyone is depending on the cloud infrastructure, but the security of this structure depends on a group of professionals known as the pen-testers or ethical hackers.

This course is aimed at giving you a kickstart to your networking and ethical hacking career. Here, we are going to begin from the basics of a computing system, like how two applications communicate amongst themselves using a network, how to escalate privileges in Linux, to advance topics like Metasploit and SQL map. We will also teach you how to detect and predict cyberattacks in advance, by the use of AI in malware analysis.

What you will learn:
The course is broadly divided into 3 parts,

1st Module: Computer Networks and Network Penetration testing

Basics of a Computer System (Operating System).
Basics of the networking infrastructure:
The OSI Model and Layers of a computer network.
Types of networks.
IP addressing (classless and classful)
Basic commands in Linux
System Manipulation commands
Network Configuration commands
Trace routing
Digital Footprinting
Network Traffic Analysis
Remote access control tools and technologies
Metasploit Framework
Remote code execution
Sending payloads through a network


2nd Module: Web Penetration Testing

Introduction to Web Penetration Testing.
Introduction to Structured Query Language
WPT using SQL Map
Introduction to Cryptography


3rd Module: AI for Cyber security.

Spam filtering and classification using Naive Bayes Classification.
Time series analysis and forecasting
Anomaly detection
Static and Dynamic Malware Analysis
Malware Analysis case study: Windows PE files.

Who is the course for?

We recommend this course to any person with some basic knowledge of coding (preferably in python), who is keen on learning about cyber security and kick-starting their penetration testing journey.

What will you get on completion?

  • Certificate of Achievement for completing the course.