logo

Penetration Testing and Ethical Hacking

TAFE NSW


Short Course

Course Overview

This course is targeted at current or aspiring IT technical workers. The learning material includes practical simulated labs and content from Ethical Hacking Pro that aligns with the EC-Council s Certified Ethical Hacker program.

 

During this course you will learn:

  • Common threats & Mitigation Strategies
  • Discover vulnerable applications
  • Penetration testing of operating system
  • Vulnerability scanning, Exploit, Post Exploit, Payload
  • Ethical hacking processes and procedures
  • Port scanning tools and enumeration methods
  • System hacking methodologies
  • Common sniffing tools

Course Content

Learn how to discover vulnerable applications, common threats, and mitigation strategies. Find out more about ethical hacking, as well as best practice policies and procedures.

Additional Details

NA

Prerequisites

Before enrolling, it is strongly recommended that you already have a basic understanding of foundational networking concepts (OSI or TCP/IP model), including the purpose and use of:

  • application layer protocols (and ports)
  • other layer protocols
  • IP address, subnet mask and default gateway

Course Image
Duration
8 to 10 hours
Estimated Cost per Participant
AUD $0.00
Estimated in IDR 0,00
Minimum participants
0
Course type
Short Course
Delivery method
Virtual
Language
English
Send Enquiry

Reviews

Total Reviews

0

Total reviews this year

Average Ratings

0

Average ratings this year

5

4

3

2

1