4.2 Read 6 reviews
Overview
The Introduction to Ethical Hacking course from Udacity leverage their knowledge of business’ processes to evaluate risks while protecting core operations.
Key facts:
- The results of an Ethical Hacker’s efforts are improvements to business policies, procedures and standards of conduct on its computer systems.
What you will do during this course:
- Perform a vulnerability scan using automated tools, manage prioritization and response, and score the vulnerabilities you uncover
- Use test scopes to understand the context and objectives of an audit, gather information about our target, research vulnerabilities, execute exploits, and write effective reports on our findings
- Use OWASP WTG methodologies, create HTTP requests to access target systems and employ semi-automated and fully-automated tools in applications audits
- Explore the tactics malicious hackers use to manipulate people to take specific actions, conduct a phishing simulation, create and deploy malware and design an effective landing page
- Employ open-source intelligence techniques to uncover information leakage. Use Exploratory Link Analysis techniques to mine data, establish links between the data and analyze the links
Programme Structure
Courses include:
- Vulnerability Management
- System Auditing
- Application Auditing
- Social Engineering
- OSINT
- Audit ExampleCorp
Key information
Duration
- Part-time
- 3 days
Start dates & application deadlines
You can apply for and start this programme anytime.
Language
English
Delivered
Online
Campus Location
- Mountain View, United States
Disciplines
Cyber Security View 158 other Short Courses in Cyber Security in United StatesWhat students do after studying
Join for free or log in to access our complete career info list.
Academic requirements
We are not aware of any specific GRE, GMAT or GPA grading score requirements for this programme.
English requirements
We are not aware of any English requirements for this programme.
Other requirements
General requirements
Prior to enrolling, you should have the following knowledge:
- Cybersecurity fluency
Tuition Fees
Additional Details
- This program can be paid for with the Udacity subscription.
Funding
Improve page content