By iCollege | in Online Courses
The CompTIA PenTest+ certification equips you to plan, conduct, analyze, and report on penetration tests. Your ability to learn and master these skills will bring value to organizations because it proves that you can ensure their data is secure. In this course, you’ll learn how to plan and scope penetration tests, conduct passive reconnaissance, perform non-technical tests to gather information and conductive active reconnaissance, and analyze vulnerabilities. Additional skills include using a fictitious company to learn how to penetrate networks, exploit host-based vulnerabilities, test applications, and complete post-exploit tasks.
Important Details
Requirements
By iCollege | in Online Courses
To become a well-rounded Ethical Hacker and/or Penetration Tester, not only must you be familiar with the appropriate tools and techniques, but you must also craft your methodology for applying said skills. One of the best ways of accomplishing that goal is by way of practical application. In this series, you'll be instructed on how to apply your hacking skills and tools to successfully scan, enumerate, access, and escalate privilege against multiple purposely vulnerable, virtual machines (VM). Each VM will present similarities and differences, offering unique challenges that your tools and techniques will need to be applied to overcome.
Important Details
Requirements
By iCollege | in Online Courses
EC-Council's Certified Ethical Hacker(CEH) course is meant to give the student a foundational knowledge and skillset to be an asset to their current organization as a security analyst or become an effective member of a security team engaged in offensive security testing and vulnerability assessments. In this course, you'll learn about specific topics including Intro to Ethical Hacking, Information gathering through foot-printing and reconnaissance techniques, network and system scanning, service enumeration, vulnerability discovery and analysis, system hacking, malware, social engineering, web application hacking, SQL Injection, Wireless, Mobile, IoT, and more.
Important Details
Requirements
By iCollege | in Online Courses
Cybersecurity professionals require a well-rounded understanding of the tools, processes, and strategies that can be employed to defend their information systems from constantly evolving threats. CyberSec First Responder (CFR) is a comprehensive certification designed to validate the knowledge and skills required to protect these critical information systems before, during, and after an incident. Analyzing the threat landscape can be a daunting task. This course will assist you in that effort by classifying the threat targets commonly attacked by threat actors.
Important Details
Requirements
By iCollege | in Online Courses
This course includes topics like Pre-engagement activities, statements of work, authorization, and the different stages of assessment. Learn how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux. All the techniques in this course are practical and work against real systems, you'll understand the whole mechanism of each technique first, then you'll learn how to use it to hack into the target system, so by the end of the course you'll be able to modify these techniques to launch more powerful attacks and adapt them to suit different situations and different scenarios.
Important Details
Requirements
By iCollege | in Online Courses
This series will discuss, explain, and demonstrate some of the common tools and techniques used by Penetrations Testers during a security audit. Watch as they explore topics like hacking platforms and test environments, creating BIND/REVERSE shells, discovering and exploiting Buffer Overflows, Cross-Site Scripting attacks, Local and Remote File Inclusion attacks, SQL-Injection, Password attacks, Privilege Escalation, and Port Redirection.
Important Details
Requirements