Cybersecurity: Ethical Hacking Pro For Ethiopians in Amharic
in Cyber SecurityWhat you will learn?
Understand what ethical hacking is and how it differs from malicious hacking.
Learn the legal rules and ethical guidelines for ethical hacking.
Set up a safe and controlled hacking environment using virtual machines.
Install and use Kali Linux for hacking activities.
Gather information and conduct reconnaissance on target systems.
Scan networks to identify open ports and services.
Assess and analyze vulnerabilities in systems and networks.
Secure web applications and systems from common threats.
Use encryption and cryptographic techniques.
Create reports on security findings and recommend improvements.
About this course
Welcome to "Cybersecurity: Ethical Hacking course in Amharic for Ethiopians– the ultimate training program for those aspiring to become top-tier cybersecurity professionals. This comprehensive course is designed to equip you with the advanced skills and knowledge required to protect organizations from cyber threats and conduct ethical hacking with precision and integrity.
In this course, you will delve deep into the world of ethical hacking, exploring sophisticated techniques and tools used by professional hackers and cybersecurity experts. Through hands-on labs, real-world scenarios, and in-depth theoretical lessons, you will master the art of identifying vulnerabilities, conducting penetration tests, and implementing robust security measures.
Key Topics Covered
Learn with interactive videos, handouts, lab simulations, and assessments.
Penetration Testing Intro | System Hacking | Web Servers & Web Applications |
Social & Physical Security | Malware & Sniffers | Wi-Fi, Bluetooth, & Mobile Devices |
Reconnaissance & Enumeration | Session Hijacking & Denial of Service | Cloud Computing & Internet of Things |
Scanning & Analyze Vulnerabilities | IDS, Firewalls, & Honeypots | SQL Injections & Cryptography |
Hands-on Lab with kali linux
Prerequisites
Related Courses
FAQ
Comments (0)
The main goal of ethical hacking
crucial things for ethical hackers.
set up a controlled and secure environment
Key Terms
the practice of finding vulnerabilities and risks
Terms
a person or organization that poses a threat to an organization's security.
Terms & definition
Key terms
Key terms
a formal legal declaration of intent to do business
The use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.
social engineering techniques,
Different motives, attributes, and attack characteristics.
a type of social engineering attack often used to steal user data,
the protection of corporate assets (including property, facilities, equipment, and personnel) from damage, theft, or harm.
the environmental threats an organization may encounter
Tasks
a critical component of security management
Terms
a systematic attempt to locate, gather, identify, and record information about a target.
several reconnaissance tools that you can use to gather information.
Tasks
policies & DNS countermeasures
key Terms
the process of actively connecting to a system to get a response and gather information
tools can be used during the scanning phase of your investigation.
Common Considerations
common method for obtaining information about a system
Tasks
to list items one by one
lists common ports
several countermeasures for attacks
Tasks
the process of identifying weaknesses in an organization infrastructure
lifecycle that an ethical hacker uses to protect an organization.
approaches to solving the vulnerability problems
Common Vulnerability Scoring System
A service or program that tests systems and devices
Tasks
Key Terms
ways a hacker can gain access to passwords
Key terms
occurs when an attacker accesses the network as a non-administrator level user and gains access to administrative-level privileges.
Key Terms
ways a hacker can maintain access
an important phase in hacking to prevent being traced and to remain undetected
hands on Tasks
Terms
programs that are designed to perform malicious and destructive functions.
Backdoor programs are embedded and hidden inside legitimate programs
other types of malware that can be cause for concern
The process of reverse-engineering a specific piece of malware in order to determine its origin, functionality, and potential impact.
an umbrella term that encompasses several types of programs that prevent malicious software from infecting a system. Anti-malware includes anti-Trojan and antivirus software.
Tasks
the process of collecting information as it crosses the network
used to prevent intrusion and alert network administrators of active attacks
The process of taking over an established connection between a host and a web server
Types of hijacking
hijacking that can be difficult to detect
occurs when a computer is used to flood a server with more packets than it can handle.
four general categories of denial-of-service attacks
ways to prevent DoS and DDoS attacks
Tasks
is a software program or hardware appliance that monitors network traffic
good rule of thumb is to avoid creating the signs of intrusion
mechanisms designed to stop, slow, or otherwise compromise a host or network
Types of Detection methods
protection system between the external and internal network
one of the most common skills attackers seek to master
evaluates the firewall's traffic filtering capabilities.
a physical or virtual network device set up to look like a legitimate network resource
a security system set up to attract attackers in order to detect, deflect, counteract, or confine unauthorized intrusion attempts on a network
Tasks
a computer used to store and distribute web pages to clients.
Server Attack Types
implement countermeasures to safeguard web servers.
programs that run on a web server and are accessed by a web browser.
hacking methodology
Basic countermeasures to a web application
an attack that attacks a web application by manipulating SQL statements entered into a web page
protect against SQL injection attacks
How to counter SQL injection attack
Tasks
allows computers, smartphones, or other devices to connect wirelessly to the internet
way to prevent unauthorized access
Types of Wireless Attacks
Wi-Fi Predictive Planning Tools
tools that can perform Bluetooth hacking
Mobile Device Security Concerns
Mobile OS Atacks
Mobile security best practices
the policies and procedures used by an organization to maintain security and permissions on mobile devices
Tasks
the characteristics, types, and deployment models of cloud computing
some of the most prominent threats against the cloud
The most prominent attacks hackers make on cloud services.
responsibilities involve both the client and the provider.
system of connected computing devices and other things that use unique identifiers and the ability to send data
Short-range protocols in use.
Some of the challenges and attacks currently plaguing the IoT.
IoT Hacking Methodology
Task
Important information to get certified