Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Students need to go through a Practical Exam at the end of the course to qualify for the Certificate.
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
AZURE ADMINISTRATORS
IT | Information Technology (IT)
Certificate
IHEUK - Institute of Higher Education UK
-
MCSA 70-740
IT | Information Technology (IT)
Certificate
IHEUK - Institute of Higher Education UK
-
Web Development
IT | Software Engineering
Certificate
IHEUK - Institute of Higher Education UK
-
LEVEL 3 Certificate IN INFORMATION TECHNOLOGY
IT | Information Technology (IT)
Certificate
IHEUK - Institute of Higher Education UK
-
Software Engineering
IT | Software Engineering
Certificate
AICT
-
Web Engineering
IT | Software Engineering
Certificate
AICT
-
MS Office
IT
Certificate
AICT
-
Microsoft PowerPoint 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
Microsoft Word Expert 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
Mastering Microsoft Project 2016
IT | Information Technology (IT)
Certificate
InnoventSys