Course Content

Course Content

FAQs

  • Web application hacking.
  • Social engineering.
  • System hacking.
  • Hacking wireless networks.
  • Web server hacking.

A hacker's actions can be broken down into six phases, including pre-attack and attack phases:

  • Performing Reconnaissance.
  • Scanning and enumeration.
  • Gaining access.
  • Escalation of privilege.
  • Maintaining access.
  • Covering tracks and placing backdoors.

The key concepts in ethical hacking are:

  • Testing for vulnerabilities
  • Penetration testing
  • Incident response

Ethical hacking terms are used by hackers to describe the process of testing a computer or network for vulnerabilities.

The terms include:

  • Scanning
  • Vulnerability
  • Penetration testing
  • Social engineering

Recommended Courses

Share With Friend

Have a friend to whom you would want to share this course?

Download LearnVern App

App Preview Image
App QR Code Image
Code Scan or Download the app
Google Play Store
Apple App Store
598K+ Downloads
App Download Section Circle 1
4.57 Avg. Ratings
App Download Section Circle 2
15K+ Reviews
App Download Section Circle 3
  • Learn anywhere on the go
  • Get regular updates about your enrolled or new courses
  • Share content with your friends
  • Evaluate your progress through practice tests
  • No internet connection needed
  • Enroll for the webinar and join at the time of the webinar from anywhere