Ethical Hacker

Etika Hacking biasanya dilakukan secara terstruktur dan teratur, biasanya sebagai bagian dari uji penetrasi atau audit keamanan. Kedalaman dan keluasan sistem dan aplikasi yang akan diuji biasanya ditentukan oleh kebutuhan dan kekhawatiran klien. Untuk itulah Cakrawala Edu mengadakan Training Etika Hacker ini

Rp. 4.500.000 Daftar di Sini
pelatihan ethical hacker

Module 1 : Introduction to Computer Security and Ethical Hacking

  • Introduction Computer Security
  • IT Security Awareness
  • Ethical Hacking and Countermeasures
  • Vulnerability Assessment Vs Penetration Test
  • Hacking Phase

Module 2 : Information Gathering

Active Information Gathering :

  • DNS Enumeration
  • Whois, dig, nslookup,
  • Online tools infrastructure Gathering (robtex, centralops, serversniff, etc)
  • Maltego Tools

Passive Information Gathering :

  • Harvesting Email Address
  • Google Hacking
  • Metagoofil
  • Online Tools (PIpl. 123people, etc)

Module 3 : Scanning Technique

Nmap :

  1. Nmap Basic
  2. Network Enumeration
  3. OS Fingerprint
  4. NSE (Nmap Scripting Engine)
  5. Service Enumeration
  • Hping
  • Unicorn Scan
  • Metasploit Scanner

Module 4 : Vulnerability Assessment

  • Nessus
  • OpenVAS

Module 5 : Network Attack

  • ARP Spoofing
  • Man In The Middle Attack
  • Netcat
  • Nmap Scripting Engine as Network¬†Pentesting tools

Module 6 : OS Attack

Pentesting with Metasploit

  1. Metasploit Fundamental
  2. Metasloit Component and Feature
  3. Metasploit Command Basic
  4. Meterpreter
  5. Backdooring Using Metasploit

Password Attack

  1. John The Ripper
  2. Hydra
  3. Medusa

Module 7 : Web Application Attack

  • Introduction to Web Security
  • Web Application Attack Vector
  • OWASP Top 10 Explanation
  • Lab Practice Web Attack against DVWA (XSS,¬† SQL Injection, Command Injection, etc)