Course Description
Diploma in Ethical Hacking
Alison
Learn about ethical hacking network vulnerabilities, and network security in this free online course. This free online ethical hacking course can be of great help for people who have much interest in the field of networking and hacking – ethically. The course gives insights into what it takes to be an ethical hacker, the roles of an ethical hacker, and network vulnerabilities. By the end of the course, you will be well equipped with the tools to use for network vulnerability assessment. Get started today and build your knowledge base.
Course Code | 2274 |
College Name | Alison |
Course Category | Computers & IT (Information Technology), IT Security |
Course Type | Online Learning |
Course Qualification | CPD Diploma |
Course Location | Online Course |
Delivery mode | |
Course Fee | Free |
Course Duration | 10-15 hours |
Entry Requirements | Like all courses on the Alison Free Learning platform this is a free, CPD-accredited course. A Graduate can choose to buy a certificate or diploma upon successful completion of a course, but this is not required or necessary. At Alison we believe that free education, more than anything, has the power to break through boundaries and transform lives. Alison is the world’s largest free online empowerment platform for education and skills training, offering over 5000 CPD accredited courses and a range of impactful career development tools. It is a for-profit social enterprise dedicated to making it possible for anyone, to study anything, anywhere, at any time, for free online, at any subject level. Through our mission, we are a catalyst for positive social change, creating opportunity, prosperity, and equality for everyone. |
Career Path | In This Free Course, You Will Learn How To • Compare ethical hacking and penetration testing • Explain how network scan, port scan and vulnerability scan work • Explain how to use Metasploit for penetration into Windows and Linux operating systems • Explain the meaning of the term "Social Engineering" • Describe man-in-the-middle attack using the concept of sniffing via ARP poisoning • Explain how the SHA-512 Compression function works • Outline the general defence guidelines against DoS and DDoS attack • Discuss some of the security issues in Domain Name System (DNS) server and email systems • Outline the meaning of plaintext, password hashing and password hash salting • Explain five password cracking techniques • Describe black box testing, physical probing, reverse engineering and side-channel analysis |
Comments, Questions & Reviews