Ethical Hacking and Cyber Security

10000 Learners


Course Objective:


Course Content:

Introduction
  • Important Terminology
  • Ethical Hacking vs. Hacking
  • Effects of Hacking on Business
  • Why Ethical Hacking Is Necessary
  • Skills of an Ethical Hacker
Networkting
  • Dissimilar type of Network Devices
  • Protocols & Port numbers
  • IP Addressing and its classes
  • VPN Network, DHCP Server
  • DNS Server, OSI Mode
Kali Linux
  • Kali Linux Vs Other Pen Testing OS
  • Installation and setup of Kali Linux
  • System Architecture of Kali Linux
  • Essential Commands of Kali Linux
Virtualization Labs Setup
  • Windows, Linux OS for Usage & Test
  • Setting up Vulnerable Machines
  • Create Network inVMs
  • Share Data in Network
  • Android Lab Virtualization
Cyber Laws
  • Introduction to Cyber laws
  • What is IT Act 2000
  • Types of Cyber crimes
  • Evolution of Cyber Law in India
Reconnaissance
  • Gathering Information
  • IP Mapping and Tracing IP address
  • DetectingWeb Server and there Location
  • Find Login Pages, eMail Login, Cpanel,Admin
Scanning
  • Detection of Alive IP Addresses
  • Port scanning techniques
  • Advance Trace route
  • Discovering with SYN,ACK,UDP, ICMP,ARP
  • ARP (MAC Address scanning)
Enumeration
  • Extract User Names Using Email Ids
  • Brute Force Active Directory
  • Extract Username Using SNMP
Anonymity
  • How hackers hide their identity
  • Working with Proxy Server & Configuration
  • Types HTTP, HTTPS,SOCK Protocols OpenVPN Client & Server Setup
Vulnerabilty Assessment
  • Types of vulnerability assessments
  • Network-based scans
  • Host-based scans
  • Wireless network scans
  • Application scans
System Hacking
  • OS Authentication Architecture
  • OS Hash BruteForcing
  • OS Password Cracking
  • Windows Login Bypass
Mobile Hacking
  • Hacking Android OS
  • Android Rooting Tools
  • Hacking Networks Using Network Spoofer
  • Android-based Sniffers
Virus And Worms
  • Types of Viruses and Worms
  • Creation ofViruses and Worms
  • Ransomware Analysis
  • Detection of Viruses and Worms
  • Recover from Ransomware
Trojans
  • Making ofTrojan(RAT)
  • Embed Trojan Word/Execl Macro- Files
  • Non-Macro Office Files -DDE
  • Shellcode vs DLLs
  • Hidden Encrypted Payloads
Steganography
  • Types Of Steganography
  • Steganography In Image
  • Steganography In Audio
  • Steganography In Video
  • Online challenge
Sniffing Spoofing
  • Man in the Middle Attacks
  • MAC spoofing & Flooding
  • ARP Poisoning
  • Rogue DHCP
  • SSL Stripping
  • Introduction to Network Sniffing
Phishing
  • Social Engineering
  • Desktop Phishing
  • Spear Phishing
  • SEToolKit
  • Punycode url
WIFI Hacking
  • Wi-Fi Technical Details
  • Types of Encryptions
  • MAC Spoofing
  • Attacks on WEP, WPA,WPA2
  • Forged Authentication Attack
  • Replay Attack
  • De-Synchronization Attack Evil Twin and Fake AP Attack
Session Hijacking
  • Session Hijacking Concepts
  • Key Session Hijacking Techniques
  • Session Hijacking Process
  • Packet Analysis of a LocalSession Hijack
  • Session Hijacking Tools
Cryptography
  • What is cryptography?
  • What is cryptography and encryption?
  • Cryptography and its Types
  • Cryptography techniques
  • Cryptography algorithms
Capture The Flag
  • Need of Penetration Testing?
  • Types of Pen Testing
  • Pen Testing Techniques
  • Security Audit
  • Vulnerability Assessment
  • Black Box Pen Testing
  • Gray Box Pen Testing
SQL Injection
  • Introduction to SQL Database
  • Types of SQL Injections
  • Authentication Bypass Injection
  • Blind Injections
  • Error Based Injection
Cross Site Scripting
  • How XSS Attacks Work
  • XSS Attack via Email Stealing Cookies via XSS
  • XSS Attack in Comment Field
  • Blog Post via XSS Attack

Key Features

  • Gain skills and competencies required in Industry by Experts.
  • Work on Real-time Projects depending upon the course you select.
  • Students work in a professional corporate environment.
  • Get a globally recognized Certificate form WebTek with our partner logos.
  • Global Brand recognition for Placements.

Includes

  • Course Duration: 4 – 6 Weeks
  • Regular Batches: Online / Offline/ Weekend
Copyright © 2020 webteklabs.com
Webteklabs
Webteklabs
Webteklabs
Webteklabs
Free Demo
Call now