Diploma in Ethical Hacking

1

Alison Review

Location

Online(Course Link)

Dates

On Demand

Course Categories

IT, Technology and Software

Certficate

Yes(Diploma)

Language

English

Course Fees

Free

No. of Attendant

Unlimited

Acquired Skills/Covered Subjects

  • Compare ethical hacking and penetration testing,Explain how network scan, port scan and vulnerability scan work,Explain how to use Metasploit for penetration into Windows and Linux operating systems,Explain the meaning of the term "Social Engineering"
Provider Name Alison
Training Areas
  • Business and Management
  • Digital Marketing
  • Fashion and Beauty
  • Humanities and ARTS
  • IT, Technology and Software
  • Languages
  • Math, Science and Engineering
  • Media and Photography
  • Medical, Fitness, Healthcare and Safety
  • Personal Development
  • Politics and Economy
  • Social Sciences
  • Supply Chain Management
  • Training and Education
  • Travel, Tourism and Hospitality
  • Others
Website https://alison.com/
About The Provider

Alison is one of the world’s largest free learning platforms for education and skills training. It is a for-profit social enterprise dedicated to making it possible for anyone, to study anything, anywhere, at any time, for free online, at any subject level. Through our mission we are a catalyst for positive social change, creating opportunity, prosperity, and equality for everyone.

Alison was founded in Galway, Ireland, in 2007 and has grown organically to become a major force in free online education and skills training. Today, with more than 13 million learners in 195 countries, Alison is changing how the world learns and up-skills.

They are committed to equality and access to education and skills training irrespective of gender, geography, economic status or any other barriers that can so often stunt potential. So they offer a range of free courses that meet the many diverse needs of our learners. The UN declared in Article 26 of the 1946 Declaration of Human Rights that “Education shall be free…”. This statement will always inspire us.

Alison was founded by Alison CEO, Mike Feerick. Mike is a businessman, but one with a difference. He believes in social impact, and that you can build a financially successful business focused on meeting a huge global social need, making education and skills training more accessible for everyone. He invites anyone who believes that too, to support the Alison mission.

Alison is free of charge to you. But it’s still a business – albeit a socially-focused one. We are a social enterprise making our money through advertising, merchandise, and the sale of Certificates and Diplomas, should a graduate choose to buy one.

This course will begin by introducing you to ethical hacking and basic concepts of networking. You will learn about the roles of an ethical hacker, penetration testing methodologies like tiger box and white box models.  You will learn about the TCP/IP stack, types of computer network, IP addressing, TCP, UDP and IP subnetting. It takes knowledge of network and computer technology to be a security tester otherwise known as an ethical hacker.


The course then explains the different routing protocols like Routing Information Protocol (RIP) and Open Shortest Path First (OSPF). You will learn about IP version 4 and IP version 6, which happens to be the latest IP version. Next, you will see a live demonstration of how a lab is set up for ethical hacking and also how to install and use Nessus for vulnerability scanning. You will gain an understanding of how real hackers think and attack innocent victims' computer systems.


Finally, you will learn about social engineering attack, man in the middle attack, basic concepts of cryptography, cryptographic hash functions, digital certificate and digital signature. You will also learn some security attacks on systems through malwares, phishing, password cracking, DDoS and Dos. You will then move on to learn about the measures taken to secure information from attackers or hackers through the use of biometrics and stenography and also perform network analysis using Wireshark

Share with...