Ethical Hacking refers to the process of finding compromises or vulnerabilities in computer and information systems by duplicating the intent and actions of malicious hackers. A person performing this act is called an Ethical Hacker and are often referred to as Whitehat Hackers or Whitehats.
In this course, no experience is necessary. By the end of this course, students will use a hands-on approach to gaining practical experience as an ethical hacker. Students will explore the fundamentals of cybersecurity concepts and techniques using a virtual install of Kali Linux and three different target victims: Windows XP, Server 2008 and Linux.
In this course, students will learn how to:
- launch DDoS Attacks, Buffer Overflows, keylogging, and password hacking
- efficiently use cybersecurity tools and techniques
- use Linux as a hacking platform
- protect a network from being hacked