Level: Certificate
Institute: Turnkey IT Training
Entry Requirement
Course Content
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Students need to go through a Practical Exam at the end of the course to qualify for the Certificate.
Inquire Now
Student Reviews
Share your thoughts
If you’ve follow this course, share your thoughts with other students.
Login to Write a reviewWrite your review
Please make sure the review is genuine and related to the course.
Related Courses
-
Cisco Certified Network Associate It is one of the most valued IT certification program
IT | Computer Networking
Certificate
Great Lake Cisco Training Center
-
Certificate in Microsoft Office Applications
IT
Certificate
AAT Business School (The Association of Accounting Technicians)
-
Web Engineering
IT | Software Engineering
Certificate
AICT
-
Ms-Office 2013 - Part Time
IT
Certificate
Lalith Atulathmudali Vocational Training Center - LAVTC
-
Microsoft MD-100 | Windows 10
IT
Certificate
NextGen Campus
-
Microsoft AZ-104T00 | Microsoft Azure Administrator
IT
Certificate
NextGen Campus
-
FNSA - Fortinet Networks Security Administration
IT
Certificate
Softwise Learnings
-
Microsoft Word Expert 2016
IT | Information Technology (IT)
Certificate
InnoventSys
-
MS Office
IT
Certificate
AICT
-
20740 | Storage and Compute with Windows Server 2016
IT
Certificate
NextGen Campus