Review.io
  • user_iconLOGIN
  • cart_icon

    No products in the basket.

Cyber Security & Ethical Hacking

CPDUK Accredited | 50% OFF Certificate & Transcript

23 Students enrolled on this course 4.8 (13 Reviews)

clock Last updated February 2, 2022

Get Lifetime Access to 3000+ Courses for only £149! Find out more.

Register on the Cyber Security & Ethical Hacking today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career.

The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials.

Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion.

The Cyber Security & Ethical Hacking is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones.

The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly!

What You Get With The Cyber Security & Ethical Hacking 
  • Receive a e-certificate upon successful completion of the course
  • Get taught by experienced, professional instructors
  • Study at a time and pace that suits your learning style
  • Get instant feedback on assessments 
  • 24/7 help and advice via email or live chat
  • Get full tutor support on weekdays (Monday to Friday)

Course Design

The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace.

You are taught through a combination of

  • Video lessons
  • Online study materials

Certification

Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99.

Who Is This Course For:

The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge.

Requirements:

The online training is open to all students and has no formal entry requirements. To study the Cyber Security & Ethical Hacking, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16.

Course Curriculum

Introduction to Ethical Hacking
Hacking Terms 00:07:00
VA vs PT and Rule of Engagement 00:09:00
Methodologies 00:07:00
Type of Pen Testing 00:06:00
Phases of Penetration Test 00:04:00
10 Steps to Follow 00:04:00
Setting up a Penetration Testing Lab
What is Linux OS – Benefits 00:04:00
What is Kali Linux 00:03:00
Virtual Box Installation 00:06:00
Kali Linux Installation in VB 00:12:00
Install Metasploitable on Virtual Box 00:09:00
Install DVWA in Kali 00:18:00
Install TOR 00:09:00
Executing Basic Commands in Kali 00:12:00
Executing Advance Commands in Kali 00:14:00
Information Gathering
What is Information Gathering 00:04:00
Maltego Part 1 00:07:00
Maltego Part 2 00:06:00
HTTrack 00:05:00
The Harvester 00:02:00
NSLookup 00:03:00
RedHawk 00:05:00
SHODAN 00:09:00
OSNIT Framework 00:05:00
Scanning and Enumeration
What is Scanning 00:07:00
What is Nmap 00:05:00
Zenmap GUI 00:17:00
What is Enumeration 00:03:00
Types of Enumeration 00:03:00
Enumeration Using Hyena – 1 00:07:00
Enumeration Using Hyena – 2 00:06:00
VAPT
What is Vulnerability Assessment 00:04:00
Phases of Vulnerability Assessment 00:08:00
Vulnerability Scoring Systems 00:09:00
Introduction to Nessus 00:05:00
Create and Configure Nessus Network Policy 00:08:00
Nessus Launch Scan and Analyse Result 00:08:00
Firewalls
What is IDS 00:11:00
What Are Firewalls 00:10:00
What is DMZ 00:06:00
IDS Evasion Techniques 00:08:00
Firewall Evasion Techniques 00:09:00
Firewall Pentesting 00:02:00
WAPT
Introduction to Web Servers 00:05:00
Types of Web Server Attacks 00:05:00
Web Server Penetration Testing 00:04:00
Countermeasures of Web Servers? 00:05:00
OWASP Top 10 Attacks Part 1 00:05:00
OWASP Top 10 Attacks Part 2 00:07:00
Website Foot Printing Part 1 00:05:00
Website Foot Printing Part 2 00:03:00
Command Execution Low 00:06:00
Command Execution Medium 00:07:00
Configuring Burp Suite 00:16:00
File Upload Low 00:10:00
File Upload Medium 00:07:00
File Upload High 00:08:00
SQL Injection 00:04:00
SQL Injection II 00:05:00
Manual SQL 00:17:00
Automating SQL 00:09:00
Countermeasures of SQL Injection 00:03:00
What Is XSS 00:03:00
Types of XSS 00:06:00
XSS Low 00:11:00
XSS Medium 00:05:00
XSS High 00:11:00
Countermeasures of XSS 00:04:00
What is CSRF 00:06:00
CSRF Practical 00:07:00
What is a Brute Force Attack? 00:05:00
Brute Force Political 00:18:00
Web Application Penetration Testing? 00:09:00
Web Application Countermeasures 00:06:00
Denial of Service
What is Denial of Service (DOS)? 00:03:00
Types of DOS attack? 00:05:00
What is a BOTNET? 00:03:00
Malware Threats
Introduction to Malware 00:09:00
Trojan 00:08:00
Types of Trojans 00:08:00
Viruses and Worms 00:07:00
Types of Viruses 00:10:00
Countermeasures 00:07:00
Social Engineering
Introduction to Social Engineering 00:05:00
Social Engineering 00:06:00
Installing BeEF Framework 00:09:00
Getting User Credentials Using BeEF Framework 00:11:00
Cryptography
Introduction to Cryptography 00:05:00
Symmetric Encryption 00:03:00
DES and AES 00:06:00
Asymmetric Encryption 00:03:00
RSA and Diffie 00:07:00
Hashing 00:07:00
Public Key Infrastructure (PKI) and Certificate Authority (CA) 00:10:00
Digital Signatures 00:09:00
Transport Layer Security (TLS) 00:04:00
Calculating One Way Hashes Using HashCal 00:04:00
Basic Data Encryption Advance and Decryption Package 00:05:00
Report Writing
Introduction to Report Writing 00:08:00
Component of a Report 00:14:00
Bonus Section
Why we need to fix vulnerabilities 00:05:00
Hacker Sponsored Security 00:03:00
Key Terms in Bug Bounty Program 00:05:00
Bug Bounty Definition 00:03:00
Public or Private Bug Bounty Program 00:04:00
What is HackerOne 00:05:00
Why Organizations will hire you 00:08:00

Course Reviews

4.8

4.8
13 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

£25

92% OFF

moneyback 14-Day Money-Back Guarantee
  • Level
  • Certificate Yes
  • Units 107
  • Quizzes 0
  • Duration 12 hours, 17 minutes
  • cpd uk
  • Tutor support

    Tutor Support

  • fully online

    Fully Online

Frequently asked questions

Can’t find the anwser you’re looking for ? Reach out to customer support team.

Are there any prerequisites for taking the course?

There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course.

Can I access the course at any time, or is there a set schedule?

You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience.

How long will I have access to the course?

For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime.

Is there a certificate of completion provided after completing the course?

Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks.

Can I switch courses or get a refund if I'm not satisfied with the course?

We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase.

How do I track my progress in the course?

Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course.

What if I have technical issues or difficulties with the course?

If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

Home Search Cart Your Offers