• Geen producten in je winkelmand.

Hieronder vind je ongelofelijk veel trainingen over hacken. Ethische hackers kunnen veel geld verdienen. Beveilingsdeskundige ook. Beide komen aan hun trekken in dit pakket.

399.00
Cursus toegang

1 jaar

Aantal studenten

20

Gemaakt door
IMNL & Stichting Gezondheid
Hoe word ik een ethische hacker? Hoe werken hackers en wat kan ik hier tegen doen?

Word een Hack Expert

Hieronder vind je ongelofelijk veel trainingen over hacken. Ethische hackers kunnen veel geld verdienen. Beveilingsdeskundige ook. Beide komen aan hun trekken in dit pakket. Let op: bijna alle cursussen zijn in het Engels.

Internet Veiligheid

Vandaag de dag gebruiken meer mensen het internet dan ooit tevoren! Ongeveer 70% van de internetgebruikers zal dit jaar een of andere vorm van een cyberaanval ondervinden, ben jij een van hen?

Internetveiligheid
Met deze accountbeveiligingshandleiding leer je …

  • Al je online accounts beveiligen
  • Een systeem gebruiken om veilige inloggegevens te genereren
  • Om alle accountactiviteit te controleren
  • Elk account 100% veilig te houden voor aanvallen
  • Het voorkomen van alle beveiligingsrisico’s voor elk account
  • Ontdek wat je moet doen bij een aanval

BlackArch Linux for Hacking and Penetration Testing
Course description - 5 uur cursus

Would you like to learn BlackArch Linux for penetration testers because this knowledge can be useful for you to advance your ethical hacking career?

In this course you will learn:

  • Preparing Kali Linux
  • Preparing BlackArch Linux
  • Ethical Hacker information gathering with BlackArch Linux
  • Windows, Android & Web application attacks

This course was designed for total beginners and there is no particular knowledge requirement. Thank you for learning about the course and we hope you love it!

  1. Mobile devices theory
  2. Mobile hacking theory
  3. Android Hacking tools
  4. Hacking mobile devices engagement
  5. IOS security controls theory
  6. Android security controls theory
  7.  How to protect your Android smartphone
  8. How to install Android emulator
  9.  Android emulators'
  10. How to install android as a virtual machine
  11.  Hacking Android devices with metasploit
  12. Metasploit Android
  13.  Becoming persistent in Android system
  14. The Instagram Hacking Course from Brute Forcing Passwords to Bug Bounties

Career Building In Cyber Security
2 hour course

  1. Introduction
  2.  What is Ethical Hacking And Why Is It Important?
  3. Which Certificates To Take ?
  4. Where To Start Learning Ethical Hacking?
  5. How To Get Your First Job as an Ethical Hacker?
  6.  How To Get A Career as an Ethical Hacker?
  7.  How To Price Your Work?

Denial of Service DOS & Distributed Denial of Service DDOS Attacks
1.5 hours

Would you like to learn denial of service or DOS attacks and Distributed Denial of Service or DDOS because this will help you to prepare for any official hacking exam or level up your cyber security and ethical hacking career?

In this course you will learn:

  • Denial of Service fundamentals
  • Basics of DoS with Kali Linux
  • DoS trough tor network with Kali Linux
  • How to connect Kali Linux in tor network
  • How to create a script which connects you to tor network with bash and Kali Linux
  • DoS with LOIC and Kali Linux

Internet of Things Hacking

Would you like to learn Internet of Things Hacking (IoT) because this knowledge can be useful for you to advance your ethical hacking career?

In this course you will learn:

  • IoT theory
  • IoT hacking tools
  • Hacking IoT
  • IoT scenario
  • Smart devices
  • AWS basics

Hacking with Malware Threats, Sniffing, and Social Engineering
Duration: 4 hours

Would you like to learn how to process malware threats, perform social engineering, and start sniffing because this will help you to prepare to pass any official hacking exam and  advance your cyber security career?

In this course you will learn:

  • Malware fundamentals
  • C fundamentals of hacking programming and files using Kali Linux
  • Basics of Python coding for networking and hacking with Kali Linux
  • Generating payloads with TheFatRat and Kali Linux
  • Fundamentals of sniffing and sniffing tools
  • Netsniff - ng - Ettercap - Wireshark
  • and more…

Secure an Ubuntu Linux Server Against Hackers Today!
Duration: 1.5 uur

In this course you will learn how to secure an Ubuntu Linux server against attacks from hackers because these simple steps can block most basic hacking attempts and provide peace of mind when running our servers.

Why take the 45 minutes to quickly secure our servers as soon as we get them?

Amateur hackers can crack our default hosting provider settings fairly easily using programs downloaded from the Internet. We can block these hacks with just a few minutes of running the commands in the Command Line Interface I show here and signing in with RSA keys instead of passwords!

I hope that this course filmed using Ubuntu Linux 16.04 will be useful for you.

Onze andere cursussen

Cursus inhoud

    • Internetveiligheid 00:00:00
    • Cursus Internetveiligheid 00:00:00
    • Kinderveiligheid E-book 00:00:00
    • BlackArch Linux for Hacking and Penetration Testing 00:00:00
    • Career Building in Cyber Security and Ethical Hacking from Studying to Employed 00:00:00
    • Denial of Service DOS & Distributed Denial of Service DDOS Attacks 00:00:00
    • Internet of Things Hacking 00:00:00
    • Hacking with Malware Threats, Sniffing, and Social Engineering 00:00:00
    • Secure an Ubuntu Linux Server Against Hackers Today 00:00:00
    • The Instagram Hacking Course from Brute Forcing Passwords to Bug Bounties 00:00:00

Cursus reviews

© Interplein Academy