Skip to content

Hacking Training Online Course


EduCBA

Summary

Price
£19 inc VAT
Study method
Online
Duration
Self-paced
Qualification
No formal qualification
Certificates
  • Certificate of completion - Free

1 student purchased this course

Add to basket or enquire

Overview

What is Hacking?

Hacking is the process of finding loopholes in a website, intrude into it and take control of the site or make it crash. To prevent malicious hackers from intruding into computer systems and networks causing severe harm, trained hackers are employed by companies to find loopholes or weaknesses in existing websites, computer networks and take measures to solve them. It is called ethical hacking.

Description

About Hacking Training Course

EduCBA’s Hacking Training course is intended to help software professionals get an overview of hacking methods with practical examples. It will provide insights into hacking techniques, strategies, study configuration, topology, understand network types and enhance skills to effectively use ethical hacking for corporates. It will enhance your skills and knowledge to convince the industry or employers about your capability in handling internet security. The course is spread into 105 lectures with 19 hours of HD video.

Introduction to hacking:

The course introduces the concept of hacking, how malicious hackers intrude into computer systems causing huge losses both in terms of data and financial for companies- How hacking has emerged as a career option and what needs to be done to achieve mastery in hacking.

General Hacking Methods:

This chapter introduces the learner to hacking methods employed by hackers and information security professionals.

  • Port Scanning: Port scanning is the process by which hackers send messages to ports to see which are open and susceptible to vulnerabilities. Just as a burglar looks for a open window, door or ventilation to make his entry into a house, hackers send messages to ports to check weaknesses.
  • ICMP Sweep/Scanning: basic network scanning to find out which IP addresses map to live hosts or computers. Internet Control Message Protocol (ICMP) – ping is an ICMP ECHO to multiple hosts, a return ICMP echo is received if port is live.
  • Tools for ICMP Echo- fping, gping, nmap for UNIX, Pinger Software- Rhino9, Ping Sweep for Windows
  • Netbios Hacking – getting entry into a computer system through Network Basic Input Output System (NETBIOS). This is how computers in a LAN or WAN is targeted- sniffing – ip addresses-local subnet
  • Internet Application Security and Vulnerability: Security breach, proactive,defensive strategies, Authenitcation, authorization. Common flaws – injection flaws-passing unfiltered data to the sQL server, to the browser, preventing injection flaws, Cross Site scripting, insecure direct object references, security misconfiguration. Sensitive data exposure, missing function level acess control, cross site request forgery. Components with vulnerabilities, unvalidated redirects and forwards.
  • Introduction to attack techniques, classes of attacks-passive attack, active attack, distributed attack, insider attack, close-in attack, phishing attack, hijack attack, spoof attack, buffer overflow, exploit attack, password attack. Online identity-location, birth date, family connections, hacking , banking, financial transactions.

Protecting online identity:

Protecting identity of user, tips for protecting online identy- social media, profiles, privacy settings,usage of multiple passwords,phishing emails, https for online transactions – s stands for security.

  • Reducing risk of online identity theft: Stealing personal information, impersonating, social security number, signature, name, address, phone number, mobile number,financial details- bank,credit card info.-committing fraud.
  • Reducing Risk of online identify theft- online transactions- ask companies how data will be used, Secure Socket Layer (SSL), Site security certificate,, data encryption, credit card info – storage and use. Destroy papers containing credit card info.
  • Action taken- Online identity theft- contact, credit bureaus- Experian, Equifax, TransuUnion, fraud alert, thief may not be able to open bank account on time.; monitor credit reports.security freeze, child identity theft, FTC Identity Theft Affidavit. ATM/Debt cards, social security number misuse,victim statement, reporting to police, legal support, keeping records.
  • Phishing- Introduction to phishing- sending email to user falsely claiming to be a genuine enterprises – get personal information for identity theft- directing to a site-updating password, credit cards , account information-bogus website, stealing information. Anti-Phishing-

Type of Phishing email/spam

fraudsters sent same email to millons of users seeking personaliinformaiton, account verification, urgency, web based delivery- hacker – intermediary between website and phising system.- Instant messaging, Trojan hosts, link manipulation, key loggers, session hacking, system reconfiguration, content injection, phishing through search engines, phone phishing, malware phishing. Anti-phishing-steps to protect computer- using firewalls, anti-virus software, Secure Socket Layer (SSL), bank,credit care statements. Summary of approaches.

Introduction to computer security and cyber crime:

Computer crime refers to stealing data, intrusioin into websites and systems- examples- cyber terrorism, cyber bullying, denial of service attack, espionage, fraud- manipulating data, changing banking records, creating malware,spoofing, unauthorized access, spamming, harvesting, salami slicing.

  • Cyber Security-IT security aims to protect computers, programs, networks, unauthorized access, modification or alteration. Importance of cyber security– government organizations, companies, corporates,financial institutions, hospitals- integrity of data,confidiential information,privacy, data transmission and theft, cyber attacks.
  • Types of hacker attacks, spoofing- unauthorized access to user’s system impersonation, steal personal data, bank account, passwords,credit card info.- email spoofing,caller ID, URL spoof attacks- fraudulent website to obtain info from users, install viruses.credit card info.
  • Web spoofing, session hijacking- allows hackers to see and modify pages sent to victim’s machine. JavaScript and web server plugins, malicious web pages, web browers don’t prevent spoofing.
  • Session hijacking –exploitation of web session control mechanism, by exposing the session token by means of predicting a valid session token to get unauthorized entry to the web server- methods- predicting session token, session sniffing,IP snooping, client side attacks, man-in-the-middle attack,man-in-the-browser attack.
  • DOS and Buffer over Flow Attack- takes advantage of a program awaiting on user’s input –Stack based and heap based attacks. Heap based- floods memory reserved for a progam execution- buffer over run, memory object or stack. When user inputs data, the stack which empty until then writes a return memory address to the stack putting the user’s input on top of it. When the stack is processed, user data is sent to return address mentioned in the pgoram.
  • Password attack- three types– Brute Force, Dictionary Attack, Keylogger attack. Brute Force- hacker tries to login with different password combinations using computer program/script. Dictionary attack- runs a program to enter using different combination of dictionary words,- Key Logger Attack-tracks key strokes of a user- this helps hackers record login IDs and passwords.

Who is this course for?

Requirements for Hacker Training:

Basic computer knowledge, software skills,networking technology, internet, intuitive problem solving ability, data mining capability. The course is meant for students undergoing graduate courses and post graduation in IT, professionals in software, networking, students from economics, finance, statistics, professionals, freshers and consultants.

Why learn Hacking?

With rapid use of computers, telecommunications equipments and networking, threats to data security, online privacy and vulnerability to attacks have increased. Hacking instances can cause heavy loss of image, money and credibility for a company.IT industry is looking for ethical hackers, IT security analysts, Certified Ethical Hackers, information analysts to come up with solutions to meet the stringent technology, regulatory norms across industry.

Questions and answers


No questions or answers found containing ''.


jose luis duran asked:

Hello, how much time do we have to complete the course? thanks jose luis

Answer:

Hello Jose, Thanks for showing interest in our courses.How you spend time on each video depends on you. You can access anytime, anywhere using any device after all of these courses have lifetime validity. Thanks

This was helpful. Thank you for your feedback.

Certificates

Certificate of completion

Digital certificate - Included

Reviews

Currently there are no reviews for this course. Be the first to leave a review.

FAQs

Study method describes the format in which the course will be delivered. At Reed Courses, courses are delivered in a number of ways, including online courses, where the course content can be accessed online remotely, and classroom courses, where courses are delivered in person at a classroom venue.

CPD stands for Continuing Professional Development. If you work in certain professions or for certain companies, your employer may require you to complete a number of CPD hours or points, per year. You can find a range of CPD courses on Reed Courses, many of which can be completed online.

A regulated qualification is delivered by a learning institution which is regulated by a government body. In England, the government body which regulates courses is Ofqual. Ofqual regulated qualifications sit on the Regulated Qualifications Framework (RQF), which can help students understand how different qualifications in different fields compare to each other. The framework also helps students to understand what qualifications they need to progress towards a higher learning goal, such as a university degree or equivalent higher education award.

An endorsed course is a skills based course which has been checked over and approved by an independent awarding body. Endorsed courses are not regulated so do not result in a qualification - however, the student can usually purchase a certificate showing the awarding body's logo if they wish. Certain awarding bodies - such as Quality Licence Scheme and TQUK - have developed endorsement schemes as a way to help students select the best skills based courses for them.