Classbaze

Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking Foundation – Part 2

Gain the knowledge hackers use to compromise systems and use it to protect your own!
4.0
4.0/5
(244 reviews)
68,564 students
Created by

7.5

Classbaze Grade®

7.1

Freshness

7.0

Popularity

7.8

Material

Gain the knowledge hackers use to compromise systems and use it to protect your own!
Platform: Udemy
Video: 1h 51m
Language: English
Next start: On Demand

Best Ethical Hacking classes:

Classbaze Rating

Classbaze Grade®

7.5 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness

7.1 / 10
This course was last updated on 12/2019.

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Popularity

7.0 / 10
We analyzed factors such as the rating (4.0/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Material

7.8 / 10
Video Score: 7.8 / 10
The course includes 1h 51m video content. Courses with more videos usually have a higher average rating. We have found that the sweet spot is 16 hours of video, which is long enough to teach a topic comprehensively, but not overwhelming. Courses over 16 hours of video gets the maximum score.
The average video length is 5 hours 20 minutes of 456 Ethical Hacking courses on Udemy.
Detail Score: 10.0 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 5.5 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

0 article.
0 resource.
0 exercise.
0 test.

In this page

About the course

You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks. You will have a firm understanding of places of hacking and mind map apart from gaining insights of denial of service, distributed denial of service, syn flooding attach using hping3, counter measures and Metasploit test.

Section 1: Components of Hacking:
Reconnaissance
Scanning
Gaining access
Maintaining access
Clearing tracks

Section 2: Ethical hacking Mindmap
Ethical hacking
Places of ethical hacking
Mind map

Section 3: DoS and DDoS
Denial of services
Symptoms of dos attack
Slow performance
Increase in spam emails
Unavailability of a resource
Loss of access to a website
Denial of access to any internet services
Distributed denial of services (DDoS)
DoS/DDoS attack techniques
Land and flood attacks
Service request floods

Section 4: SYN flooding attach using hping3

Section 5: Counter Measures
Counter-measures
DoS/DDoS countermeasure strategies
Detech and neutralize handlers
Monitoring the activities running on a system of network
Deflect attacks by load balancing
Mitigate attacks disabling unnecessary services
Intrusion detection systems
Wavelet analysis

Section 6: Metasploit test
Metasploit is so popular is the wide range of tasks that it can perform to ease the work of penetration testing to make
systems more secure. Metasploit is available for all popular operating systems.
Vulnerability
Exploit
Payload
Meterpreter

Type of Cybercrime
•The following list presents the common types of cybercrimes:
•Computer Fraud: Intentional deception for personal gain via the use of computer systems.
•Privacy violation: Exposing personal information such as email addresses, phone number, account details, etc. on social media, hacking a websites, etc.
•Identity Theft: Stealing personal information from somebody and impersonating that person.
•Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
•Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
•Electronic money laundering: This involves the use of the computer to launder money.
•ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
•Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
•Spam: Sending unauthorized emails. These emails usually contain advertisements.

What can you learn from this course?

✓ You will learn the different components of Hacking: Reconnaissance, Scanning, Gaining access, Maintaining access & Clearing tracks.
✓ You will have a firm understanding of places of hacking and mind map.
✓ You will gain insights of denial of service and distributed denial of service
✓ You will gain clality on syn flooding attach using hping3, counter measures and Metasploit test.

What you need to start the course?

• You should have completed the previous course in order to continue learning. Course : Ethical Hacking Foundation – Part 1

Who is this course is made for?

• Students and Professionals interested in a career in Cyber Security and Ethical Hacking
• This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

Are there coupons or discounts for Ethical Hacking Foundation - Part 2 ? What is the current price?

The course costs $14.99. And currently there is a 40% discount on the original price of the course, which was $24.99. So you save $10 if you enroll the course now.
The average price is $16.7 of 456 Ethical Hacking courses. So this course is 10% cheaper than the average Ethical Hacking course on Udemy.

Will I be refunded if I'm not satisfied with the Ethical Hacking Foundation - Part 2 course?

YES, Ethical Hacking Foundation – Part 2 has a 30-day money back guarantee. The 30-day refund policy is designed to allow students to study without risk.

Are there any financial aid for this course?

Currently we could not find a scholarship for the Ethical Hacking Foundation - Part 2 course, but there is a $10 discount from the original price ($24.99). So the current price is just $14.99.

Who will teach this course? Can I trust Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!?

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! has created 45 courses that got 6,261 reviews which are generally positive. Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! has taught 313,316 students and received a 4.0 average review out of 6,261 reviews. Depending on the information available, we think that Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! is an instructor that you can trust.
Cybersecurity, Data Science & Human Capital Practitioners!
We specialize in Cybersecurity, Data Science and Talent Management/Human capital management training. The USP of all our training’s is the hands-on that we provide, our focus is on real-life practical knowledge sharing, and not tool-based PPT slides. All our training’s are conducted by highly experienced practitioners who are dyed-in-the-wool penetration testers. The material is cutting edge and updated with even the most recent developments. We have a standard set of courses outlined in different information security domains, data analytics domains and Talent management domain. However, we also customize the training according to the clients’ requirements.

7.5

Classbaze Grade®

7.1

Freshness

7.0

Popularity

7.8

Material

Platform: Udemy
Video: 1h 51m
Language: English
Next start: On Demand

Classbaze recommendations for you