fbpx
User Avatar

Ethical Hacking Course Training In Jaipur

180 days
All levels
0 lessons
0 quizzes
0 students

Course Modules:

Networking Concepts

  • How does internet work.
  • What is network ?
  • Countermeasures of network.
  • What is IP and? types of IP ?
  • What is Mac ?
  • What is Cookie and Cache ? .
  • Domain Name System
  • DNS Poisoning
  • Name Server
  • Electronic Mail
  • Architecture and Services
  • Mail Access Protocols
  • Introduction of Ports
  • Introduction to Web Browser
  • Detail Study on Buffer or Packets
  • Detail Study on Internet and Intranet
  • Detail Study on Firewall
  • Concept of Routing and Switching

Operating System Concepts

  • Introduction to Operating System
  • Types of Operating System
  • Bootstrapping Technology
  • Understanding Windows
  • Understanding Tokens
  • Impersonation Tokens
  • Local and Domain Escalation
  • Process Scheduling
  • Concept of ACL

Introduction to Ethical Hacking

  • What is Ethical Hacking
  • Types of Hackers
  • Who is a Hacker
  • Security Challenges
  • Scanning
  • Skills required for an Ethical Hacker
  • Types of Attacks
  • What do Ethical Hackers Do
  • Vulnerability Research
  • Effects of Hacking
  • How can Hacking be Ethical
  • Types of Data Stolen from the organization
  • What is Penetration Testing
  • Penetration Testing Methodology

Footprinting

  • Footprinting Terminologies
  • What is Footprinting
  • Methods of Footprinting
  • Benefits of Footprinting
  • People Search
  • Who-is-lookup
  • DNS Lookup
  • Analyzing Email Headers
  • Extracting DNs Information
  • Traceroute
  • Mirroring Websites
  • Finding Vulnerable Web-Sites
  • Extracting Website Informations
  • Tracking Users
  • Tracking Emails Communications
  • Tracking Mobile Communications
  • Mobile Communications Countermeasures
  • Additional Footprinting Tools
  • Complete Study on CCAS Tracing Tools

Google Hacking

  • What a hacker Do using Google Hacking
  • Footprinting using Google Hacking Technique
  • Google Advance Search Operators
  • Google Hacking Tools
  • Error Message Queries

Scanning Network

  • Network Scanning
  • Types of Scanning
  • Three Way Handshake
  • TCP Communication Flags
  • Hping Commands
  • Scanning Techniques
  • Searching Vulnerable Systems
  • Complete Study on All CCAS Scanning Tools
  • Operating System Fingerprinting
  • Scanning Countermeasures
  • Securing Network
  • Complete Study on Banner Grabbing
  • Vulnerability Scanning
  • Proxy Servers
  • Use of Proxies
  • Working of Multi Proxies
  • Proxy Tools
  • HTTP Tunnelling Technologies
  • SSH Tunnelling
  • IP Spoofing Detection Technology
  • IP Spoofing Countermeasures
  • Anonymizers
  • Types of Anonymizers
  • Anonymizers Tools

System Hacking & Password Breaking

  • System Hacking: Goals
  • CCAS Hacking Methodology
  • Password Cracking
    • Password Complexity
    • Password Cracking Techniques
    • Types of Password Attacks
    • Microsoft Authentication
    • How Hash Passwords are Stored in Windows SAM?
    • PWdump7 and Fgdump
    • LazeSoft
    • ?Ophcrack
    • Cain & Abel
    • Detail Study on Password Cracking Tools
    • Privilege Escalation
      • Escalation of Privileges
      • Keylogger
      • Types of Keystroke Loggers
      • Detail Study on Keyloggers and Spywares
      • AntiKeyloggers
      • Spyware
      • Types of Spyware
      • USB Spyware
      • Audio Spyware
      • Email or internet Spyware
      • Antispyware
      • RootKits
      • Types Of RootKits
      • Details Study on Spyware or RootKits
      • AntiRootkits
      • Covering Tracks?

Steganography & Cryptography

  • What is Steganography
  • Steganography Techniques
  • How Steganography Works
  • Types of? Steganography
  • Methods of Steganography
  • Steganography Detection Tools
  • Cryptography
  • Types of Cryptography
  • Cryptography Techniques
  • What is SSH
  • Cryptography Tools
  • Cryptography Attacks
  • Code Breaking Methodologies

Trojans and Backdoors

  • Introductions to Trojans
  • Reasons of Trojans
  • How to use Trojans
  • How Systems get infected? by Trojans
  • Types of Trojans
  • Designing Trojans
  • Removing? Trojans
  • Detail study on Designing and use Trojans
  • Detections Trojans
  • How to create Backdoors
  • Uninstalling Trojans remotely
  • Purpose of Backdoors
  • Study on Anti-Trojan Sofware
  • Backdoor Countermeasures
  • Trojans Countermeasures

Viruses & Worms

  • Introduction to Viruses
  • Stages of Viruses Life
  • Working Of Viruses
  • Why Do People Create Computer Viruses
  • Indications of Viruses attack
  • How does a Computer get infected by Viruses
  • Viruses Analysis
  • Types of Viruses
  • Desiging Viruses
  • Computer Worms
  • Worm Maker
  • Worm Analysis
  • Anti-Virus Tools
  • Virus detection methods
  • Virus & Worms Countermeasures

Sniffers & Phishing

  • Sniffing Threats
  • How a Sniffer Works
  • What is Address Resolution Protocol (ARP)
  • Types of Sniffing
  • How DHCP works
  • Spoofing Attacks
  • DNS Poisoning
  • Sniffing Tool : WireShark
  • Sniffing Prevention Techniques
  • How to Detect Sniffing

Social Engineering

  • What is Social Engineering
  • Behaviors Vulnerable to attacks
  • Why is Social Engineering Effective
  • Warning Signs of an Attacks
  • Phases in a Social Engineering attack
  • Impact on the Organization
  • Command Injection Attacks
  • Common Targets of Social Engineering
  • Types of Social Engineering
  • Social Engineering Through Impersonation On Social networking Sites
  • Risks of Social Networking to Corporate Networks
  • Social Engineering Countermeasures

Denial of Service

  • What is Denial of Service Attack
  • What is Distributed Denial Of Service Attacks
  • Symptoms of DoS atrack
  • Internet Relay Chat (IRC)
  • DoS Attack Techniques
  • Botnet
  • DoS/DDoS Countermeasures
  • Detail Study on DoS attack Tools
  • Detection Techniques

Session Hacking

  • What is Session Hijacking
  • Key Session Hijacking Techniques
  • Session Hijacking Process
  • Types of Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Methods to Prevent Session Hijacking
  • Defending Against Session Hijacking Attacks

Hacking Web Applications

  • Web Application Security Statistics
  • Introduction to Web Applications
  • Web Application Components
  • How Web Applications Work?
  • Web Application Architecture
  • Injection Flaws
  • What is LDAP Injection?
  • How LDAP Injection Works?
  • Cross-Site Scripting (XSS) Attacks
    • How XSS Attacks Work?
    • Cross-Site Scripting Attack Scenario: Attack via Email
    • XSS Example
    • XSS Cheat Sheet
    • Cross-Site Request Forgery (CSRF) Attack
    • How CSRF Attacks Work?
  • Web Application Denial-of-Service (DoS) Attack
  • Buffer Overflow Attacks
  • Cookie/Session Poisoning
    • How Cookie Poisoning Works?
  • Hacking Web Servers
  • Username Enumeration
  • Password Attacks: Password Functionality Exploits
  • Password Attacks: Password Guessing
  • Password Attacks: Brute-forcing
  • Session Attacks: Session ID Prediction/ Brute-forcing
  • Cookie Exploitation: Cookie Poisoning
  • Encoding Schemes
    • How to Defend Against SQL Injection Attacks?
    • How to Defend Against Command Injection Flaws?
    • How to Defend Against XSS Attacks?
    • How to Defend Against DoS Attack?
    • How to Defend Against Web Services Attack?
  • Web Application Countermeasures
    • Web Application Firewall

SQL Injection

  • What is SQL Injection?
  • SQL Injection Attacks
  • How Web Applications Work?
  • SQL Injection Detection
  • Types of SQL Injection
  • What is Blind SQL Injection?
  • SQL Injection Methodology
  • Information Gathering
  • Password Grabbing
  • Grabbing SQL Server Hashes
  • Extracting SQL Hashes (In a Single Statement)
  • SQL Injection Tools
  • How to Defend Against SQL Injection Attacks?
  • How to Defend Against SQL Injection Attacks: Use Type-Safe SQL Parameters

Miscellaneous

  • Wifi Hacking – WPA2
  • Creating fake access point
  • Android Phone hacking
  • Deleted Data recovery
  • Detail study on android phone pattern breaking
  • Android Phone Rooting
  • MITM
  • Whatsapp Data Recovery
  • Cyber Crime Investigation
  • Introduction to Cyber Crime Investigation.
  • Types of Cyber Crimes.
  • Report Cyber Crimes.
  • Investigating Emails (Email Tracing)
  • Online email header analysis.
  • Investigating Phishing Cases.
  • Investigating Data Theft Cases.
  • Investigating Orkut Profile Impersonation Cases.
  • Cyber Law & IT Act, 2000 / 2008.

To Download Complete Syallbus Click Here

More Industrial Training Courses Click here

0.0
0 total
5
0
4
0
3
0
2
0
1
0
Call Now ButtonCall