Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Students need to go through a Practical Exam at the end of the course to qualify for the Certificate.
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
Developing SQL Data Models
IT | Information Technology (IT)
Certificate
InnoventSys
-
ITIL 4 Foundation
IT | Information Technology (IT)
Certificate
InnoventSys
-
CISSP – Certified Information Systems Security Professional
IT | Information Systems
Certificate
InnoventSys
-
QA – Software Testing
IT | Software Testing
Certificate
InnoventSys
-
Software Test Automation with Selenium
IT | Software Testing
Certificate
InnoventSys
-
ICAD – iOS Certified Associate Developer
IT | Software Engineering
Certificate
InnoventSys
-
ACAD – Android Certified Associate Developer
IT | Software Engineering
Certificate
InnoventSys
-
AWS Certified Developer – Associate
IT
Certificate
InnoventSys
-
AWS Certified Solutions Architect- Associate
IT
Certificate
InnoventSys