Course details
Ethical Hacking training from Indian Cyber Security Solutions is the most demanded training in India. Certified Ethical Hacking Professional (C|EHP) The ethical hacking course goes in-depth into the techniques used by Black Hat hackers and demonstrates it live in a lab-based 100% practically oriented class. As these hacking skills can be used in a bad way, our ethical hacking course will teach you how you can use the same skills to protect the intellectual property of organizations and individuals and become a white hat hacker. During the course of ethical hacking, you will develop the ability to measure and mitigate threats and find out where your organization is more vulnerable to be hacked.
Course Content:
Introduction To Ethical Hacking
- What is hacking? And what is Ethical about it?
- Types of Hackers.
- Terminology of Hacking [Vulnerability, Exploit, 0-Day]
- 5 Steps of Hacking [Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks]
- Discussing about Information Gathering [Active, Passive]
- Information Gathering Practical [who.is, yougetsignal.com]
- Google Hacking
- Types of malicious files [virus, worm, rootkit etc]
- Introduction to Kali/Linux OS
- Social Engineering
Installation
- According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali 1.1.0a/Backbox, Windows XP SP2
- Install VMware, OSs on it using Bridge Connection
- Completion of the Lab setup.
Explanation of the tools
- Ping a Website to get IP ii) Addon:-server spy, Passive recon, Flagfox, Ghostery, Cryptofox, Wapplazer (Mozilla Firefox), Tamper data
- Network Scan, Port Scan, Service Scan, OS Fingerprint Scan [Nmap/Zenmap]
- Network Vulnerability Scanning [Nessus/Open VAS]
- Metasploit, SE Toolkit
- Web Vulnerability Scanning [Acunetix/Zap]
- Sql-Injection [Havij, Sqlmap]
- Cryptography
- Steganography
System Hacking
- System Hacking using Kon-Boot, Live CD
- Prevention of System Hacking
- Types of Passwords
- Password Cracking
- Dictionary, brute force attack, Rule-Based attack
- Keylogger, Spyware, Rootkits
- Defending Keylogger, Spyware and Rootkits
Network Penetration Testing
- Remote Administration Tool {RAT}
- Scanning with NMAP
- Installing of Nessus
- Vulnerability Scanning using Nessus/Qualys Free Scan/ GFI Lan Guard
- Metasploit
- Set toolkit
- Protect System from RAT
- Protect System from Metasploit
- What is Sniffing and what is the mechanism of Sniffing
- How to use Wireshark and Cain and Able as a sniffer
- What is netscan and how it works. Real-time practical
- Malware threats and prevention
- Denial Of Service/ Distributed Denial Of Service
- Session Hijacking
- Hacking Wireless Network
- MAC Spoofing
- IP Spoofing
- Tor Browser and VPN
Web Application Penetration
- Web Application and its basics (Understanding HTML and its response and a website works)
- OWASP Top 10 Vulnerability
- SQL-Injection [Basic, Advance, Blind]
- Practical of Sql-Injection using Havij/Sqlmap
- Prevention of Sql-Injection
- Cross Site Scripting and Its effect
- Prevention of Cross-site scripting
- Data-tampering on E-commerce Sites
- Prevention of Data-tampering
- Website Defacement and Prevention
- E-mail hacking using phishing
- Hacking Web Servers
About Indian Cyber Security Solutions - ICSS
- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- Website Hacking From Scratch StudyHubINR 1,126
INR 21,953Duration: Upto 10 Hours - Ethical Hacker Certification - Level 3 London Institute of Business & ManagementINR 1,904
INR 17,732Duration: Upto 14 Hours