Ethical Hacking

(10 customer reviews)

Module 01: Introduction to Basics of Ethical Hacking Lesson 01: Intro To Ethical Hacking Lesson 02: Types of Attacks Lesson 03: Hacking Methodology Lesson 04: Cyber Kill Chain Lesson 05: Types of Attackers Module 02: Foot-printing Active (Tool-Based Practical) Lesson 01: What is Active Footprinting Lesson 02: Different kinds of information gathered in Footprinting Lesson […]

SKU: 1
Category:

Description

Module 01: Introduction to Basics of Ethical Hacking
Lesson 01: Intro To Ethical Hacking
Lesson 02: Types of Attacks
Lesson 03: Hacking Methodology
Lesson 04: Cyber Kill Chain
Lesson 05: Types of Attackers

Module 02: Foot-printing Active (Tool-Based Practical)
Lesson 01: What is Active Footprinting
Lesson 02: Different kinds of information gathered in Footprinting
Lesson 03: Tools for Active Footprinting = nmap, hping, Masscan Etc

Module 03: Foot-printing Passive (Passive Approach)
Lesson 01: What is passive footprinting
Lesson 02: Footprinting Through Whois
Lesson 03: Footprinting Through Website / Web services
Lesson 04: Footprinting Through search engine
Lesson 05: Footprinting Through DNS
Lesson 06: Footprinting Through Email
Lesson 07: Footprinting Through Network
Lesson 08: Footprinting Through Social Media
Lesson 09: Tools for Passive Footprinting – Google dorks, shodan, netcraft

Module 04: In-depth Network Scanning
Lesson 01: Overview of Network Scanning
Lesson 02: Scanning Methodology
Lesson 03: Host Discovery
Lesson 04: Port Scanning Techniques
Lesson 05: Scanning tools – nmap, netdiscover, arp-scan -1

Module 05: Enumeration User Identification
Lesson 01: Enumeration Concepts
Lesson 02: Network Basic Input Output System (NetBIOS) Enumeration
Lesson 03: Simple Network Management Protocol (SNMP) Enumeration
Lesson 04: Lightweight Directory Access Protocol (LDAP) Enumeration
Lesson 05: Simple Mail Transport Protocol (SMTP) Enumeration
Lesson 06: Domain Name System (DNS) Enumeration

Module 06: System Hacking Password Cracking & Bypassing
Lesson 01: Authentication
Lesson 02: Gaining Access
Lesson 03: Password cracking
Lesson 04: Password Cracking Techniques
Lesson 05: Steganography

Module 07: Viruses and Worms
Lesson 01: Introduction to Malware
Lesson 02: Types of Viruses
Lesson 03: Types of Worms

Module 08: Trojan and Back door
Lesson 01: Types of Trojans
Lesson 02: Components Of a Trojan

Module 09: Bots and Botnets
Lesson 01: Introduction to Botnets
Lesson 02: Characteristics of Botnets

Module 10: Sniffers MITM with Kali
Lesson 01: Introduction to Ettercap and Bettercap
Lesson 02: Practical on Ettercap
Lesson 03: Practical on Bettercap

Module 11: Sniffers MITM with Windows
Lesson 01: Introduction to Wireshark
Lesson 02: Practical on Wireshark

Module 12: Social Engineering Techniques Theoretical Approach
Lesson 01: Types of Social Engineering Attacks
Lesson 02: Human Based Social Engineering Attacks
Lesson 03: Computer Based Social Engineering Attacks
Lesson 04: Mobile Based Social Engineering Attacks

Module 13: Social Engineering Toolkit Practical Based Approach
Lesson 01: Practical on zphisher
Lesson 02: Practical on Social Engineering Toolkit (SET)

Module 14: Denial of Service (DOS) & Distributed Denial-of-Service (DDOS)
Attacks
Lesson 01: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Concepts
Lesson 02: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Attack Techniques
Lesson 03: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Tools
Lesson 04: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Protection Tools and Techniques

Module 15: Web Session Hijacking
Lesson 01: Session Hijacking Concepts
Lesson 02: Session Hijacking Techniques
Lesson 03: Session Hijacking Tools

Module 16: SQL Injection Manual Testing
Lesson 01: SQL Injection Concept
Lesson 02: Types of SQL Injection
Lesson 03: Working Of SQL Injection
Lesson 04: SQL Injection Methodology

Module 17: SQL Injection Automated Tool-Based Testing
Lesson 01: Practical on sqlmap
Lesson 02: Practical on Ghauri

Module 18: Basics of Web App Security
Lesson 01: Fundamentals of Web Application Security
Lesson 02: Common Vulnerabilities in Web Applications
Lesson 03: Best Practices for Web App Security

Module 19: Hacking Web servers
Lesson 01: Web Server Hacking Techniques
Lesson 02: Server Rooting Methods
Lesson 03: Securing Web servers

Module 20: Hacking Wireless Networks Manual CLI Based

10 reviews for Ethical Hacking

  1. Bharath Kumar

    I have learned the basics of ethical hacking here. Robin Sir taught me the fundamentals clearly, so now I am able to learn hacking on my own from the internet.

  2. ANNIE RAJASREE INTI (verified owner)

    It’s a good opportunity to improve the knowledge about the security of the network and systems.
    I have learnt valuable knowledge and hands-on skills. Sir has outstanding knowledge and explains in very clear. Such a Beautiful Experience. Thank you Robin Sir for this course.

  3. Kuna Dharma rao

    Thank you sooo much Robin sir your excellent faculty in cyber security.well teaching sir thank you for giving me this great opportunity.ethical hacking is my life passion sir 🙏🏻🙏🏻🙏🏻

  4. Teja vanishka

    Its was a good experience of learning live ethical classes ,this course will help for girls .A very good teaching by robin sir ,he has a wonderful knowledge.Thank you sir for this course

  5. Sreevathsalya

    The fundamentals were on point and the teaching was friendly even the doubts got clarified with so much information provided. Overall it was a good experience.

  6. Harshitha

    I highly recommend this course. The teaching was friendly my doubts were clarified. I got basic knowledge on ethical hacking. If you are looking for good ethical hacking course this is worthwhile.

  7. JUTTU RAJKUMAR (verified owner)

    If any of you are debating whether or not to join this course, I highly recommend you to join this course as it has all the concepts of ethical hacking covered and with such an experienced teacher, you will be able to grasp the concept in minutes, Thank you Bro.

  8. Udayeswar Sreerama (verified owner)

    A good and highly recomended course for every student there is no any age limit for learning this course a heart ful thanks to Robin bro for his excellence teaching from basics to advance.If you are fresher to hacking bro will teach you from very basic to highly advance level.For btech students this is golden opurtunity to gain a extra skill and easy to operate the system.Once again thankyou to robin bro……

  9. Raj Kumar Pammi (verified owner)

    Cyber bird offers a great beginner’s ethical hacking course with clear, engaging content and practical examples. and also conducted a workshops. we can access the course anytime.

  10. SAI (verified owner)

    I recently took an Ethical Hacking course, and I must say, it has been an outstanding experience. The instructor’s teaching style is excellent—clear, concise, and highly engaging. Complex concepts are broken down into simple, digestible pieces, making it easy to follow along, even for beginners.

    One of the standout aspects is the hands-on approach. The practical exercises and real-world examples not only deepen understanding but also help build confidence in applying the skills in real scenarios. The instructor is knowledgeable and patient, always ready to answer questions and provide additional resources when needed.

    The course covers a wide range of topics, from basic networking to advanced penetration testing techniques. It’s well-structured, ensuring a smooth progression from foundational concepts to more advanced skills.

    I highly recommend this course to anyone looking to step into the world of cybersecurity or enhance their ethical hacking skills. The value it provides far exceeds expectations!

Add a review

Your email address will not be published. Required fields are marked *