Current Status
Not Enrolled
Price
COMING SOON
Get Started
This integral bytes course is currently closed
Batch Duration | Two Weeks with 2 Weekend Sessions |
Start Date | To Be Announced |
Online Access to Session Recording | 100 Days |
Self Study Content Access | 1 Year |
Study Methodology | Online Self Study, Live Sessions, Practical Assignments (To be explained during 1st session) |
Key Requirements | 2 Hours Self Study Daily over the course Personal Laptop with 8 GB RAM Good Internet Connection at Home |
After Succesful Completion | IBSA Certificate |
Ethical Hacking learning starts from Networking & Kali Linux.
It goes on to learn how to detect and exploit the vulnerabilities of available systems.
In this module, we provide you basic knowledge on Kali Linux – How to Install, Manage and Use for Cyber Security. The syllabus includes –
- Kali Installation
- SHELL & Help in Kali
- Files & Directory in Kali
- Services & APT in Kali
- Command Line
- Bash Scripts