The Complete Cyber Security Course : Part 2 - Hacking

Go to class
Write Review

The Complete Cyber Security Course : Part 2 - Hacking provided by Udemy is a comprehensive online course, which lasts for 1-2 hours worth of material. The Complete Cyber Security Course : Part 2 - Hacking is taught by Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!. Upon completion of the course, you can receive an e-certificate from Udemy. The course is taught in Englishand is Paid Course. Visit the course page at Udemy for detailed price information.

Overview
  • Gain the knowledge hackers use to compromise systems and use it to protect your own!

    What you'll learn:

    • You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks.
    • You will have a firm understanding of places of hacking and mind map.
    • You will gain insights of denial of service and distributed denial of service
    • You will gain clality on syn flooding attach using hping3, counter measures and Metasploit test.

    You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.


    Section 1: Components of Hacking:

    Reconnaissance

    Scanning

    Gaining access

    Maintaining access

    Clearing tracks


    Section 2: Ethical hacking Mindmap

    Ethical hacking

    Places of ethical hacking

    Mind map


    Section 3: DoS and DDoS

    Denial of services

    Symptoms of dos attack

    Slow performance

    Increase in spam emails

    Unavailability of a resource

    Loss of access to a website

    Denial of access to any internet services

    Distributed denial of services (DDoS)

    DoS/DDoS attack techniques

    Land and flood attacks

    Service request floods


    Section 4: SYN flooding attach using hping3


    Section 5: Counter Measures

    Counter-measures

    DoS/DDoS countermeasure strategies

    Detech and neutralize handlers

    Monitoring the activities running on a system of network

    Deflect attacks by load balancing

    Mitigate attacks disabling unnecessary services

    Intrusion detection systems

    Wavelet analysis


    Section 6: Metasploit test

    Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make

    systems more secure. Metasploit is available for all popular operating systems.

    Vulnerability

    Exploit

    Payload

    Meterpreter


    Type of Cybercrime

    • The following list presents the common types of cybercrimes:

    • Computer Fraud: Intentional deception for personal gain via the use of computer systems.

    • Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.

    • Identity Theft: Stealing personal information from somebody and impersonating that person.

    • Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.

    • Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.

    • Electronic money laundering: This involves the use of the computer to launder money.

    • ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.

    • Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

    • Spam: Sending unauthorized emails. These emails usually contain advertisements.