Classbaze

Disclosure: when you buy through links on our site, we may earn an affiliate commission.

Ethical Hacking Foundation – Part 3

Maltego Tool Demo, Cyber kill chain methodology, Security attack vectors & Phishing techniques
3.4
3.4/5
(117 reviews)
52,182 students
Created by

7.1

Classbaze Grade®

7.1

Freshness

5.8

Popularity

7.8

Material

Maltego Tool Demo
Platform: Udemy
Video: 2h 6m
Language: English
Next start: On Demand

Best Ethical Hacking classes:

Classbaze Rating

Classbaze Grade®

7.1 / 10

CourseMarks Score® helps students to find the best classes. We aggregate 18 factors, including freshness, student feedback and content diversity.

Freshness

7.1 / 10
This course was last updated on 12/2019.

Course content can become outdated quite quickly. After analysing 71,530 courses, we found that the highest rated courses are updated every year. If a course has not been updated for more than 2 years, you should carefully evaluate the course before enrolling.

Popularity

5.8 / 10
We analyzed factors such as the rating (3.4/5) and the ratio between the number of reviews and the number of students, which is a great signal of student commitment.

New courses are hard to evaluate because there are no or just a few student ratings, but Student Feedback Score helps you find great courses even with fewer reviews.

Material

7.8 / 10
Video Score: 7.9 / 10
The course includes 2h 6m video content. Courses with more videos usually have a higher average rating. We have found that the sweet spot is 16 hours of video, which is long enough to teach a topic comprehensively, but not overwhelming. Courses over 16 hours of video gets the maximum score.
The average video length is 5 hours 20 minutes of 456 Ethical Hacking courses on Udemy.
Detail Score: 9.9 / 10

The top online course contains a detailed description of the course, what you will learn and also a detailed description about the instructor.

Extra Content Score: 5.5 / 10

Tests, exercises, articles and other resources help students to better understand and deepen their understanding of the topic.

This course contains:

0 article.
0 resource.
0 exercise.
0 test.

In this page

About the course

Students will go through a demo of the maltego community edition 4.2.4, they will gain insights on cyber kill chain methodology and how a traditional kill chain model works: recon, weaponize, deliver, exploit, install, c2, actions.
Students will build their capability in information security attack vectors, phishing techniques, whaling and phishing mitigation. They will understand the types of ransom-wares, how crypto ransomware works, they will go through a real world example of a ransomware attack on the Bristol airport screens.
Students will understand the various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems. They will gain knowledge on zero-day exploit, malware and its types, man in the middle (mitm) attack and web application security.

Maltego Tool Demo:
Maltego is software used for open-source intelligence and forensics, developed by Paterva from Pretoria, South Africa. Maltego focuses on providing a library of transforms for discovery of data from open sources, and visualizing that information in a graph format, suitable for link analysis and data mining. As of 2019, the team of Maltego Technologies headquartered in Munich, Germany has taken responsibility for all global customer-facing operations.

Cyber kill chain methodology:
The “cyber kill chain” is a sequence of stages required for an attacker to successfully infiltrate a network and exfiltrate data from it. Each stage demonstrates a specific goal along the attacker’s path. Designing your monitoring and response plan around the cyber kill chain model is an effective method because it focuses on how actual attacks happen.

Security attack vectors:
An attack vector is a method or pathway used by a hacker to access or penetrate the target system. Hackers steal information, data and money from people and organizations by investigating known attack vectors and attempting to exploit vulnerabilities to gain access to the desired system. Once a hacker gains access to an organization’s IT infrastructure, they can install a malicious code that allows them to remotely control IT infrastructure, spy on the organization or steal data or other resources.

Phishing techniques:
There are a number of different techniques used to obtain personal information from users. As technology becomes more advanced, the cybercriminals’ techniques being used are also more advanced.
To prevent Internet phishing, users should have knowledge of how the bad guys do this and they should also be aware of anti-phishing techniques to protect themselves from becoming victims.

What can you learn from this course?

✓ You will start using Maltego Tool after you go through a demo of the Maltego community edition 4.2.4.
✓ You will feel confident and comfortable with cyber kill chain methodology
✓ You will learn how a traditional kill chain model works: recon,weaponize, deliver, exploit, install, c2, actions.
✓ You will build your capability in information security attack vectors, phishing techniques, whaling and phishing mitigation.
✓ You will be able to explain on your own the types of ransomwares
✓ You will learng how crypto ransomware works and will go through a real world example of a ransomware attack on the Bristol Airport Screens.
✓ You can formulate various mitigation strategies, phishing & firewalls, intrusion detection and prevention systems.
✓ You can give insightful talks on zero-day exploit, malware and its types, man in the middle (mitm) attack and can get conversant with web application security.

What you need to start the course?

• You should have completed two previous courses, this course is a continuation of the previous courses: a)Ethical Hacking Foundation – Part 1 b)Ethical Hacking Foundation – Part 2

Who is this course is made for?

• Cyber Security Students,IT Security Enthusiasts, Those who are interested in a career in cyber security and ethical hacking domain
• This course is for Beginners and not for advanced audience. Hence the faculty explains each concept in detail and demonstrates with relevant tools where required.

Are there coupons or discounts for Ethical Hacking Foundation - Part 3 ? What is the current price?

The course costs $14.99. And currently there is a 40% discount on the original price of the course, which was $24.99. So you save $10 if you enroll the course now.
The average price is $16.7 of 456 Ethical Hacking courses. So this course is 10% cheaper than the average Ethical Hacking course on Udemy.

Will I be refunded if I'm not satisfied with the Ethical Hacking Foundation - Part 3 course?

YES, Ethical Hacking Foundation – Part 3 has a 30-day money back guarantee. The 30-day refund policy is designed to allow students to study without risk.

Are there any financial aid for this course?

Currently we could not find a scholarship for the Ethical Hacking Foundation - Part 3 course, but there is a $10 discount from the original price ($24.99). So the current price is just $14.99.

Who will teach this course? Can I trust Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight!?

Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! has created 45 courses that got 6,261 reviews which are generally positive. Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! has taught 313,328 students and received a 4.0 average review out of 6,261 reviews. Depending on the information available, we think that Sai Acuity Institute of Learning Pvt Ltd Enabling Learning Through Insight! is an instructor that you can trust.
Cybersecurity, Data Science & Human Capital Practitioners!
We specialize in Cybersecurity, Data Science and Talent Management/Human capital management training. The USP of all our training’s is the hands-on that we provide, our focus is on real-life practical knowledge sharing, and not tool-based PPT slides. All our training’s are conducted by highly experienced practitioners who are dyed-in-the-wool penetration testers. The material is cutting edge and updated with even the most recent developments. We have a standard set of courses outlined in different information security domains, data analytics domains and Talent management domain. However, we also customize the training according to the clients’ requirements.

7.1

Classbaze Grade®

7.1

Freshness

5.8

Popularity

7.8

Material

Platform: Udemy
Video: 2h 6m
Language: English
Next start: On Demand

Classbaze recommendations for you