Course Details

ETHICAL HACKING

 

Sessions
Name of topics
1
Network concept
            What is Network?
•           What is IP and types?
•           Internet working
•           Domain Name
•           Server
•           Ports and Types of Ports
•           Introduction to Web Browser
 
 
2
Ethical hacking & cyber security & overview
Cybercrime scenario in India and worldwide
•           Short description about hacking vs. Ethical hacking
•           Skill Profile of a Hacker
•           Some Famous Hackers and Groups
•           Cyber World
•           Advantage and Disadvantage of Cyber world
•           Types of Hackers
•           Classes of Hacker
•           Who is a Hacker
•           Security Challenges
•           Skills required for an Ethical Hacker
 
 
3
Overview of cyber law
Introduction To Cyber Law
•           Cyber Laws Indian
•           Technical Aspect Of Indian Cyber Law
•           IT ACT 2000 & 2008
•           Internet Crimes And Frauds
•           Cyber Law Cases In India
•           Organization Under Cyber Laws
•           Advantages Of Cyber Laws
4
Computer virtualization technology & lab setup
           Need & Advantage Of Virtualization
•           Requirements for virtualization
•           Creating virtual machines and optimization performance
•           Installing OS (Windows and Linux) On Virtual Machines
•           Virtual networking what and why?
 
 
 
5
Information gathering
           What Is Information Gathering & Why Hackers Need This?
•           Types Of Information Gathering
•           Information Gathering Using Websites
•           Information Gathering Using Software
•           Search Engines- Smart Way Of Information Gathering
•           Ping
•           Who-is Lookup
•           People Search
•           DNS Lookup
•           Benefits of Foot printing
 
 
6
Windows , Linux hacking & security
           Introduction Windows Security
•           User Accounts Security, Attacks and countermeasure
•           Hacking Into System by Changing Passwords
•           Getting Access to System By Elevating Privileges
•           Finding Out the Passwords Of Windows
•           Bypassing the Windows Security
 
 
7
Data recovery
 
 
8
Steganography nd cryptography
 
 
9
Desktop exploitation & data hiding
 
 
10
Fake calling & SMS
 
 
11
Mobile phone Hacking
•           Use of mobile in hacking
•           Hidden function of mobile
•           Backdoor Attack
 
 
12
Denial of service attack ( DOS – attack)
           What is a Denial of Service Attack?
•           What is Distributed Denial of Service Attacks?
•           DoS Attack Techniques
•           Detail Study on DoS Attack Tools
 
 
13
Hacking by viruses , Trojans ,key loggers
           What is viruses ?
•           What is Trojan?
•           Trojans/viruses Attack
•           Different way a Trojan Can Get Into A System
•           How Attacker Bypass Your Antivirus By Trojans
 
 
14
VPN technology
Proxy And Types Of Proxies
•           Why Hackers Use Proxy?
•           How To Hide IP Address While Chatting
•           How To Open Block Website In College/Companies
•           Convert Your Machine As Proxy Server With HTTPS Proxy
•           Advantage And Disadvantage Of Proxy
•           How Proxy Hack Your Passwords Etc
•           What Is VPN?
•           Why We Use VPN
•           Advantage & Disadvantage Of VPN
•           Free VPN
 
 
15
Google hacking and Google hacking database
·         Introduction and Working of Search Engines
·         List of Common Search Engines on Web
·         Comparing and Choosing Best Search Engine
·         Google For Hacking Search Engines
·         Finding Admin Pages and Weakness In Site
·         Security against Search Engine Hacking
 
 
 
18
E-mail/social sites hacking and security issues
·         Analysis Email Attacks (Live Demo) Manually & Automatic
·         Cookies Stealing (Session Hijacking) of All Big Mail Servers
·         Phishing Attacks ( Normal & Advanced )
·         Analyzing Fake & Real Profiles & Email Accounts
·         Fake Mailing Attack
·         Email & Fake Profile Tracing
·         Facebook Phishing Attacks
·         Facebook Account security with Email & SMS Noti.
 
 
16
SQL Injection
·         SQL Injection Attacks
·         How Web Applications Work?
·         SQL Injection Detection
·         Types of SQL Injection
·         How to Defend Against SQL Injection Attacks..??
 
 
17
·         Wireless hacking
·         Wireless Standards
·         Common Vulnerabilities in Wireless Devices
·         Encryption Standards Used in Wi-Fi
·         WEP Cracking
·         WPA/WPA2 Cracking
·         WPS Cracking
·         Solve Security challenges
 
 
18
Linux training
·         what is Linux & how to operate this OS
·         use of Linux
·         Wi-Fi cracking & security
·         Pentesting(Site Cloning)
·         Network find
·         Network scanning
·         DNS Hacking(Server hacking)
·         What is DNS..??
·         DNS Attack
·         FACEBOOK/Any Mail id HACKED!!!
·         Security
·         wifi jammer
·         Armitage
·         NMAP
·         Honey ports
·         terminal function
·         …….many more hacking
 
 
 
19
Security
·         FaceBook/mail Account Security
·         Whatsapp Security
·         Andriod phone Security
 
 
20
Cyber crime case study
·         Introduction to cyber crime and investigation
·         Types of cyber crimes
·         Investigation Email / Tracing
·         ….many more case study

Online inquiry