COURSE OBJECTIVE:
This course will provide you with:
• In-depth knowledge of ethical hacking methodologies and practices, augmented with AI techniques
• The skills to integrate AI across ethical hacking phases: reconnaissance, scanning, gaining access, maintaining access, and covering tracks
• AI techniques to automate tasks, boost efficiency, and detect sophisticated threats beyond traditional methods
• Tools that will utilize AI for proactive threat hunting, anomaly detection, and predictive analysis to prevent cyber-attacks
TARGET AUDIENCE:
Cybersecurity professionals – Those looking to drive their cybersecurity career forward with the power of AI.
Teams and organizations – Teams looking to turbocharge their AI knowledge in order to stay one step ahead of malicious actors.
Government and military – Government departments and defense bodies looking for a trusted and highly valued global certification partner.
– Security officers
– Auditors
– Security professionals
– Site administrators
– Penetration testers
– Individuals concerned about the integrity of network infrastructure
COURSE PREREQUISITES:
• At least two years of IT security experience
• A strong working knowledge of TCP/IP
COURSE CONTENT:
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
FOLLOW ON COURSES:
Not available. Please contact.