About the course
In this course, you will learn ethical hacking from the ground up. You will first get a brief introduction to ethical hacking followed by detailed instructions to set up the environment. Then you will learn about password cracking, WiFi hacking, Dos attacks, SQL injections and a lot more.
This course on ethical hacking has been designed for you to learn the fundamentals of ethical hacking. You will understand how ethical hacking plays a very important role in the present-day scenario. In this course, you will learn about the basic concepts of networking and how they work. After that, you will learn about what is TCP protocol stack and data on how data flows through these layers... Then you will come to know about the TCP & IP protocol . You will also explore about the IP subnetting, different routing protocols followed by IP version 6(IPv6). After that, you will come to know about the Kali Linux installation process, basic concepts of cryptography and its types and different tools used in ethical hacking like the Nmap tool, Wireshark tool, etc. The course will conclude with some of the suggestions and practical knowledge that help you become a good ethical hacker. This is completely an online course with a short duration. You can access this course from anywhere in the world.
The course can be taken by:
Students: All students who are pursuing professional graduate/post-graduate courses related to computer science and engineering or data science.
Teachers/Faculties: All computer science and engineering teachers/faculties.
Professionals: All working professionals from the computer science / IT / Data Science domain.
- 24X7 Access: You can view lectures as per your own convenience.
- Online lectures: Online lectures with high-quality videos.
- Updated Quality content: Content is the latest and gets updated regularly to meet the current industry demands.
Why learn Ethical Hacking?
Ethical Hacking sometimes called Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.
In today's digital era, one of the biggest threats comes from cybercriminals. Hackers were not taken seriously until a few years back. Recently, some big names in the Indian industry had to pay hefty sums of money to hackers to keep confidential information from being disclosed to the government. According to surveys conducted by the cybersecurity firms in the country, Indian firms lost more than $4 billion in 2013 alone because of hackers. With more and more companies entering the e-commerce ecosystem and adopting new technologies like cloud computing, the threat from imminent security breaches is clearly demanding the need for efficient information security systems. The rising threat from cyber-attacks has exposed a severe shortage of talent in this sector. As per 2015 figures reported by Nasscom, India needed more than 77,000 white hat hackers as against only a mere 15,000 certified professional ethical hackers in that year.
Test & Evaluation
Each lecture will have a quiz containing a set of multiple-choice questions. Apart from that, there will be a final test based on multiple-choice questions.
Your evaluation will include the overall scores achieved in each lecture quiz and the final test.
- The access to the course can be extended 3 months at a time (for upto 4 times) just by sending a mail requesting for an extension to the email id in the footer.
- The hard copy of the certificate shall be shipped to your registered address or your college
- There is no soft copy of the certificate.
- To get access to the certificate - you need to take the online exam at the end of the course