👇 CELEBRATE CLOUD SECURITY DAY 👇
00
HOURS
00
MINUTES
00
SECONDS
This exam is intended for the following people-
• Programmers
• Students and graduates
• IT professionals
• Job seekers
It is suggested for the candidates to possess fundamental knowledge and skills of programming if they wish to appear for this exam.
Penetration testing or ethical hacking is basically the practice of testing a computer system or web application for finding security vulnerabilities that an attacker might exploit.
• Basics of Kali Linux
• Lab Setup
• Essential Terminal Commands
• Information Gathering Tools
• Vulnerability Analysis Tools
• Database Hacking Tools
• Password Cracking Tools
• Man-in-the-Middle Attack or Sniffing Tools
• Social Engineering Attack Tools
• Wireless Hacking Tools
• Exploitation Techniques
• Post-Exploitation Techniques
• Pen Test Reporting Tools