If you aren't happy with the training within 24 hours we'll refund your money
This cyber security training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment will give each student in-depth knowledge and practical experience with the current essential security systems.
Students will get a deep understanding of all the concepts and practices of Ethical Hacking and Pentesting . They will also learn about nmap ,metasploit and other kali linux tools.
By the end of the program, they will have hands-on understanding and experience in Ethical Hacking and Security in Offensive Way.
section 1 : Introduction to Ethical Hacking
|1||Intro-1 - Hacking Terminologies|
|2||Intro-2 - About Ethical Hacking|
|3||Intro-3 - Vulnerability assessment & Penetration Testing|
|4||Intro -4 – Laws and Standards|
|5||Ethical Hacking – The Complete Guide_Resource Link|
section 2 : Installation of Kali linux
|1||kali linux Installation Process|
section 3 : Password Cracking practicals
|1||Password Attacks - crunch – Create your own Dictionary|
|2||Password Attacks - medusa - FTP password hacking|
|3||Password Attacks - hydra – protocol password Cracking|
|4||Password Attacks - john – Crack Hashes|
section 4 : Scanning Networks
|1||Scanning – 1 - introduction to Scanning Networks|
|2||Scanning – 2 – port Scanning process|
|3||Scanning – 3 – nmap (Port Scanner)|
|4||Scanning – 4 – Nessus Vulnerability Scanner|
|5||Scanning – 5 – proxy chaining and Softwares|
|6||scan-4 - nmap Practical|
|7||scan-5 – Colasoft Builder and Advance ip scanner practical|
|8||scan-6 – Proxy practical|
|9||scan-7 – Nessus Installation Practical|
section 5 : Enumeration
|1||deep-1 - introduction to enumeration|
|2||deep-2 - Various enumeration techniques|
|3||deep-3 – Enumeration Tools and Techniques|
section 6 : System hacking and Malware Threats
|1||sys-6 – Ophcrack and Quickstego Practcal|
|2||sys-7 – Buffer Overflow Practical with metasploit|
|3||sys-8 – Crunch Command|
|4||syshack-1 – Introduction to System Hacking|
|5||syshack-2 – SAM file in windows|
|6||syshack-3 – privilege Escalation and Keyloggers|
|7||syshack-4 - Spywares and Steganography Techniques|
|8||syshack-5 - Log Tempering|
section 7 : Sniffing
|1||sniff-6 – Find Mac Address using arp|
|2||sniff-8 – Mac changer|
section 8 : Dos Attack ( Denial Of Service Attack)
|1||dos-1 – Introduction to Denial Of Service|
|2||dos-2 – DOS attack mitigation Techniques|
|3||dos-3 – Techniques to Flood a network|
|4||dos-4 – type of dos attack and dos tools .|
|5||dos-5 – DosHTTP Practical|
|6||dos- 6 – hping3 Practical|
section 9 : Vulnerability Analysis
|1||Vulnerability analysis - Golismero – System Vulnerability Scanner|
|2||Vulnerability analysis - Lynis – Audit A system|
|3||Vulnerability analysis - Nikto – Vulnerability Scanner|
|4||Vulnerability analysis - Nmap – Port Scanning and Banner Grabbing|
section 10 : Hacking web applications
|1||hackweb-1 - Introduction to Web Haacking|
|2||hackweb-2 – Methods to web hacking|
|3||hackweb-3 – SQL Injection and XSS attack|
|4||hackweb-4 – Web Application Pentesting Tools|
|5||web application analysis – burpsuite setup - Burpsuite Installation|
|6||web application analysis - burpsuite main – Web Pentesting using Burpsuite|
|7||web application analysis - skipfish – web application security scanner|
|8||web application analysis - wpscan – wordpress website security scanner|
section 11 : SQL Injection
|1||sql-1 – Introdution to SQL Injection|
|2||sql-2 – SQL injection technique without tools|
|3||sql-3 – Sqlmap Tool in Kali linux|
|4||sql7 – Acunetix Web Vulnerability Scanner Practical|
|5||sql-8 – Pentest a website using sqlmap|
section 12 : Social Engineering
|1||sc-2 – Introduction to Social Engineering|
|2||sc-3 – Types of Social Engineering|
|3||sc-4 – Top Methodologies of Social Engineering|
section 13 : Information Gathering
|1||foot-3 – who.is|
|2||foot-4 – search personalities on pipl.com|
|3||foot-5 – yougetsignal.com|
section 14 : Database assessment / Database Hacking Practicals
|1||Jsql - Sql injection using jsql in kali linux|
|2||SQLite database – About SQL Database|
|3||Sqlsus – sql injection using sqlsus tool|
Confidence to tackle job interviews related to the Cyber Security Industry.
Skills required to become a Professional Ethical Hacker.
Mastery over Ethical Hacking and Penetration Testing techniques and concepts.
In-depth knowledge and practical hands-on experience through lab-intensive training.
On successful completion of the course, you will receive a Course Completion Certificate from KnowledgeHut with 8 Credits (1 credit per hour of video).
"Good training session. Impressive courseware"
"KnowledgeHut; One stop for all training needs."
"One stop for everything, all under the same roof!"
"Good planning for the CSM training Delhi"
Our Course Advisor will get back within 24 hours with timings of Demo Class