22nd Dec 2024
15-18 hours Live class
Will be Sent By Mail
What will you be Studying?
Module 01: Introduction to Ethical Hacking
• Network Fundamental
• Linux and Bash Scripting
• Information Security Overview
• Hacking Methodologies and Framework
• Hacking concepts
• Ethical Hacking Concepts
Module 02: Footprinting and Reconnaissance
• Footprinting Concepts
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking
• Website, Email Footprinting
• Footprinting Tools
• Footprinting Countermeasures
Module 03: Scanning Networks
• Network Scanning Concepts
• Scanning tools
• OS, Host, Port and Service Discovery
• Scanning IDS and Firewall
• Network Scanning Countermeasures
Module 04: Enumeration
• Enumeration Concepts
• NetBIOS, SNMP, LDAP, NTP, NFS, SMTP and DNS Enumeration
• Enumeration Countermeasures
Module 05: Vulnerability Analysis
• Vulnerability Assessment Concept
• Vulnerability Classification and Assessment Types
• Vulnerability Assessment Tools
• Vulnerability Assessment Reports
Module 06: System Hacking
• Gaining Access
• Escalating Privileges
• Maintaining Access
• Clearing Logs
Module 07: Malware threats
• Malware Concepts
• APT Concepts
• Trojan Concepts
• Virus and Worm Concepts
• Fileless Malware Concepts
• Malware Countermeasures
• Anti-Malware Software
Module 08: Sniffing
• Sniffing Concepts
• Sniffing Technique: MAC, DHCP, ARP, Spoofing Attacks
• DNS Poisoning
• Sniffing Tools
• Sniffing Countermeasures
Module 09: Social Engineering
• Social Engineering Concepts
• Social Engineering Techniques
• Insider Threats
• Impersonation on Social Networking Sites
• Identity Theft
• Social Engineering Countermeasures
Module 10: Denial of Service
• Dos/DDoS Concepts
• Botnets
• Dos/DDoS Attack Techniques
• DDos Case Study
• DoS/DDoS Attack Countermeasures
Module 11: Session Hijacking
• Session Hijacking Concepts
• Application Level Session Hijacking
• Network Level Session Hijacking
• Session Hijacking Tools
• Session Hijacking Countermeasures
Module 12: Evading IDS, Firewalls, and Honeypot
• IDS, IPS, Firewall and Honeypot Concepts
• IDS, IPS, Firewall and Honeypot Solution
• Evading IDS
• Evading Firewalls
• Evading Tools
• Detecting Honeypots
• Countermeasures
Module 13: Hacking Web Servers
• Web Server Concepts
• Web Server Attacks
• Web Server Attack Methodology
• Web Server Attack Countermeasures
• Patch Management
Module 14: Hacking Web Applications
• Web Application Concepts
• Web Application Threats
• Web Application Hacking Methodology
• Web API, Webhooks and Web Shell
• Web Application Security
Module 15: SQL Injection
• SQL Injections Concepts
• Types of SQL Injection
• SQL Injections Methodology
• SQL Injection Tools
• Evasion Techniques
• SQL Injection Countermeasures
Module 16: Hacking Wireless Networks
• Wireless Concepts
• Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• Wireless Hacking Tools
• Bluetooth Hacking
• Wireless Attack Countermeasures
• Wireless Security Tools