The University of Texas at El Paso

Ethical Hacking v12 - Learn Hacking

Course Name

Ethical Hacking v12 - Learn Hacking

Contact Hours: 40 (an estimated time frame devoted to a course of study from start to finish that can vary from student to student)

Course Description

Wanting to learn how to hack?

“White-Hat” hacking to be more specific. The Ethical Hacking v12 course covers ethical hacking of networks and system penetration testing. This course covers all of the exam objectives for the EC-Council exam ECC 312-50 version 12 exam. Students are taken step-by-step through hacking and exploiting each network and system type. Tools used in the activities are a combination of Windows and Kali Linux-based. You have access and instructions on setting up a full virtual environment to allow you to gain practical hands-on experience during the course. A broad range of examples used by hackers is covered.

The “Ethical Hacking” and “Forensic Investigator in Computer Hacking” course(s) are unofficial programs that have been developed by ITU independently of EC-Council. EC-Council has not been endorsed, sponsored or certified this material at any time whatsoever. Usage of these material/books does not provide any guarantee of passing the EC-Council exam.

Please note: Course of study may be completed earlier than indicated.

Outcome

In this course, you will learn hands-on penetration testing and hacking skills including:

  • Footprinting, scanning, and enumeration
  • Vulnerability analysis
  • Sniffing and Spoofing
  • Social engineering
  • Denial of Service
  • Web server, web application, and database hacking
  • System hacking using various forms of malware and tools
  • Wireless network and mobile device hacking
  • Evading IDS
  • Firewalls and Honeypots
  • Cryptography
  • Cloud computing and Internet of Things hacking

Assessment

Visual Demonstrations & Multimedia Presentations - Our courseware includes instructor-led demonstrations and visual presentations that allow students to develop their skills based on real world scenarios explained by the instructor. We always focus on real world scenarios and skill-set development.

Outline

  1. Ethical Hacking - Introduction to Ethical Hacking
  2. Ethical Hacking - Footprinting and Reconnaissance
  3. Ethical Hacking - Network Scanning
  4. Ethical Hacking - Enumeration
  5. Ethical Hacking - Vulnerability Analysis
  6. Ethical Hacking - Malware Threats
  7. Ethical Hacking - Sniffing
  8. Ethical Hacking - Social Engineering
  9. Ethical Hacking - Denial of Service
  10. Ethical Hacking - Session Hijacking
  11. Ethical Hacking - Hacking Webservers
  12. Ethical Hacking - Hacking Web Applications
  13. Ethical Hacking - SQL Injection
  14. Ethical Hacking - Hacking Wireless Networks
  15. Ethical Hacking - System Hacking
  16. Ethical Hacking - Hacking Mobile Platforms
  17. Ethical Hacking - Evading IDS, Firewalls, and Honeypots
  18. Ethical Hacking - Cryptography
  19. Ethical Hacking - Cloud Computing
  20. Ethical Hacking- IoT Hacking
  21. Ethical Hacking v12 - Learn Hacking

Books

All training is delivered online; no additional purchase required.