• Search...

categories: Technology & Innovation

CyberSecurity, Network
Cyber Security,datasecurity,ethicalhacking
Cyber security , malware
SDG 8: Decent Work and Economic Growth

Basics of System hacking and Penetration Testing

New
Duration: 3 h 16 m / 23 lessons

Level: General

Course Language: Arabic

By the end of this course, you will be able to

  •  Learn the techniques used for password cracking and implement them practically to assess system strength.

  •  Understand how to remain undetected within systems, avoid attack detection, and erase activity traces.

  •  Explore different types of malware, such as viruses and Trojans, learn how to create them, and gain insights into social engineering strategies and their applications.

  •  Comprehend network attack mechanisms, including eavesdropping, ARP poisoning, MAC flooding, and Denial-of-Service (DoS) attacks, while designing practical labs to understand these techniques.

  •  Get familiar with various protection systems, methods to bypass them, and the importance of virtual traps (Honeypots).

Course details

  • 3 h 16 m/23 lessons
  • Last updated: 2/2/2025
  • Course completion certificate

Course Content

Free lessons

1.

Password cracking practical

16 Minutes
2.

Malware Overview

5 Minutes
3.

Introduction to DoS Attacks

4 Minutes

About this course

Acquiring the necessary skills to protect digital systems and secure sensitive information has become more crucial than ever. That’s why we present to you the course "Basics of System hacking and Penetration Testing" which provides you with a comprehensive and practical understanding of penetration testing and the basics of cybersecurity, enabling you to identify and effectively address system vulnerabilities. The course begins by explaining hacking techniques and password cracking fundamentals, starting with theoretical concepts to understand how encryption and protection techniques work, and moving on to applying practical strategies for password cracking. This helps you grasp how to strengthen password security. Additionally, you will learn about Steganography techniques and Covering Tracks— essential tools for ethical hacking to ensure these activities remain undetected during testing operations. The course also includes an in-depth study of malware such as viruses, Trojans, and worms, along with how to design and use these in testing environments. Furthermore, you will gain hands-on experience in network attacks like eavesdropping, ARP poisoning, and Denial-of-Service (DoS) attacks, with practice in virtual environments that simulate real-world scenarios. To deepen your understanding of defensive systems, the course covers Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), firewalls, and honeypots. You will also learn bypassing strategies and detection methods, equipping you to analyze and evaluate the security architecture of any system. By the end of the course, you will be equipped with the foundational knowledge and skills that prepare you to confidently enter the field of cybersecurity.

Course requirements and prerequisites

This course requires basic computer knowledge, and a keen interest in cybersecurity.

Mentor

Basics of System hacking and Penetration Testing

New
Duration: 3h 16m / 23 lessons
Level: General
Course Language: Arabic