Cyber Security Starter Kit (CSSK) -2023
Ethical Hacking
What you will learn
Introduction to Ethical Hacking
Network Fundamental
Port Scanning
Information Gathering
Getting Latest Upgrade with latest Methods and tools
Why take this course?
Introduction Ethical Hacking :-
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.
Foot Printing :-
Foot printing is a part of reconnaissance process which is used for gathering possible information about a target computer system or network.
Port Scanning :-
Port are the doors from which data enters & leaves the system.
Computers use port numbers to determine to which process or application a message should be delivered.
As network addresses are like street address, port numbers are like suite or room numbers.
Network Fundamentals :-
A computer network, is a digital telecommunications network which allows nodes to share resources.
An Internet Protocol address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.
A gateway is a node (router) in a computer network, a key stopping point for data on its way to or from other networks. Thanks to gateways, we are able to communicate and send data back and forth.
A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
A network switch is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device