Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Students need to go through a Practical Exam at the end of the course to qualify for the Certificate.
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
System Center 2012 Orchestrator
IT | Information Technology (IT)
Certificate
InnoventSys
-
Advanced Technologies of SharePoint 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
Programming in HTML5 with JavaScript and CSS3
IT | Information Technology (IT)
Certificate
InnoventSys
-
Programming in C#
IT | Information Technology (IT)
Certificate
InnoventSys
-
Developing ASP.NET Core MVC Web Applications
IT | Information Technology (IT)
Certificate
InnoventSys
-
Querying Data with Transact-SQL
IT | Information Technology (IT)
Certificate
InnoventSys
-
Developing SQL Databases
IT | Information Technology (IT)
Certificate
InnoventSys
-
Administering a SQL Database Infrastructure
IT | Information Technology (IT)
Certificate
InnoventSys
-
Provisioning SQL Databases
IT | Information Technology (IT)
Certificate
InnoventSys
-
Implementing a SQL Data Warehouse
IT | Information Technology (IT)
Certificate
InnoventSys