0% found this document useful (0 votes)
232 views2 pages

Ethical Hacking Diploma Certificate

This certificate verifies that Fahrul Rahman from Indonesia has completed the Diploma in Ethical Hacking course from Alison, scoring 82% after studying for 9 hours and 47 minutes across 15 modules. The course introduced ethical hacking concepts and networking fundamentals, covering topics like IP addressing, routing protocols, penetration testing tools, cryptography, security attacks, and network analysis.

Uploaded by

Fahrul Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
232 views2 pages

Ethical Hacking Diploma Certificate

This certificate verifies that Fahrul Rahman from Indonesia has completed the Diploma in Ethical Hacking course from Alison, scoring 82% after studying for 9 hours and 47 minutes across 15 modules. The course introduced ethical hacking concepts and networking fundamentals, covering topics like IP addressing, routing protocols, penetration testing tools, cryptography, security attacks, and network analysis.

Uploaded by

Fahrul Rahman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Learner Achievement Verification

This is to certify that the management of Alison has decided to award Fahrul Rahman living in Indonesia the certificate of

completion in Diploma in Ethical Hacking.

Learner Details

Name: Fahrul Rahman

E-mail: [email protected]

Country: Indonesia

Course and Result

Diploma in Ethical Hacking


This course will begin by introducing you to ethical hacking and basic concepts of
networking. You will learn about the roles of an ethical hacker, penetration testing
Score methodologies like tiger box and white box models. You will learn about the TCP/IP
82% stack, types of computer network, IP addressing, TCP, UDP and IP subnetting. It takes
Study Time knowledge of network and computer technology to be a security tester otherwise
known as an ethical hacker.
9:47:51

Modules Studied

Module 1: Ethical Hacking and Basic Concepts of Networking

Module 2: IP Addressing and Routing

Module 3: Routing Protocols

Module 4: Nessus Installation

Module 5: Using Metasploit for Penetration Testing

Module 6: Diploma in Ethical Hacking - First Assessment

Module 7: Cryptography

Module 8: Cryptographic Hash Functions

Module 9: Information Security

Module 10: Information Security Attacks

Module 11: Hardware Security

Module 12: Vulnerability Scanning


Module 13: Network Analysis Tools

Module 14: Diploma in Ethical Hacking - Second Assessment

Module 15: Course assessment

You might also like