Course:: Ethical Hacking

Duration: 35 Hours


About this course:

         Hacking being one of the most threats online needs systematic approach and technical expertise to manage, abort and restrict the access. The Ethical Hacking course is specifically emphasized to help achieve optimal information and security safeguarding –of course in a step by step articulated course curriculum. The attendee will be trained in five specific phase wherein he/she will graduate the skillset and knowledge at every phase. The aim of the course is to enable them to approach their target and achieve their goal each time. The Five level of graduating the course are Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Underground Hacking Tools:


         All the hacking tools and techniques have been clearly defined, explained in each five phases in an encyclopedic approach, so the trainee is able to identify, comprehend when an attack has been used against your own targets.

         The reason behind naming it as “The Ethical Hackeing Course” is because Hackers use the same method and technique to attack your site; in order to combat and abort their attention using the same techniques as them, one can assess the security posture of an organization with the same approach, identify weaknesses and repair the problems even before they are recognized by the attacker, and help save the organization from being a cyber victim..

         Ethical Hacking course will equip your technical expertise and will act as a protection shield against all odd & vulnerableattacks. During the course, the five stages will graduate your understanding and help you understand the physiological hacker's mindset, evaluating not just logical, but physical security. The course will help you explore all possible point of entry to find the weakest scope or penetration point in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster.


Target Audience:

                   This course is designed for Graduate Fresher’s who are looking for successful career in cyber security, IT professionals and who want to understand key IT security issues and how best to address them. The course will also be of benefit to IT systems analysts, designers and software developers.


Prerequisites:

                  There is no prerequisite to attend this programme and basic understanding of Microsoft Windows operating systems; and familiarity with Linux would be an advantage.


Course Outline:
Module 1 / Threats, Attacks, and Vulnerabilities

           Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds

           Information Security Overview

           Information Security Threats and Attack Vectors

           Hacking Concepts, Types, and Phases

           Ethical Hacking Concepts and Scope

           Information Security Controls

           Physical Security

           Incident Management

           What is Vulnerability Assessment?

              Penetration Testing

              Information Security Laws and Standards


Module 2: Foot printing and Reconnaissance

           Foot printing Concepts

           Foot printing Methodology

           Foot printing Tools

           Foot printing Countermeasures

           Foot printing Penetration Testing


Module 3: Scanning Networks

           Overview of Network Scanning

           Ethical Hacking Scanning Methodology


Module 4: Enumeration

           Enumeration Concepts

           NetBIOS Enumeration

           SNMP Enumeration

           SNMP Enumeration Tools

           NTP Enumeration

           SMTP Enumeration

           Enumeration Countermeasures

           SMB Enumeration Countermeasures

           Enumeration Pen Testing


Module 5: System Hacking

           Information at Hand before System Hacking Stage

           System Hacking: Goals

            Hacking Methodology (CHM)

            System Hacking Steps

           Hiding Files

           Covering Tracks

           Penetration Testing


Module 6: Malware Threats

           Introduction to Malware

           Trojan Concepts

           Types of Trojans

           Virus and Worms Concepts

           Malware Reverse Engineering

           Countermeasures

           Anti-Malware Software

           Penetration Testing


Module 7:Sniffing

           Sniffing Concepts

           MAC Attacks

           DHCP Attacks

           AR Poisoning

           Spoofing Attack

           DNS Poisoning

           Sniffing Tools

           Sniffing Tool: Wireshark

           Follow TCP Stream in Wireshark

           Display Filters in Wireshark

           Additional Wireshark Filters

           Packet Sniffing Tool: Caps Network Analyzer

           Network Packet Analyzer

           Counter measures

           Sniffing Detection

           Sniffing Pen Testing


Module 8:Social Engineering

           Social Engineering Concepts

           Social Engineering Techniques

           Impersonation on Social Networking Sites

           Identity Theft

           Social Engineering Countermeasures

           Penetration Testing


Module 9: Denial-of-Service

           Dos/DDoS Concepts

           Dos/DDoS Attack Techniques

           Botnets

           DDoS Case Study

           DoS/DDoS Attack Tools

           Counter-measures

           DoS/DDoS Protection Tools

           DoS/DDoS Attack Penetration Testing


Module 10: Session Hijacking

           Session Hijacking Concepts

           Application Level Session Hijacking

           Network-level Session Hijacking

           Session Hijacking Tools

           Counter-measures

           Session Hijacking Pen Testing



Delivery method: Classroom / Attend from Anywhere

Contact Us