5.00
(2 Ratings)

Ethical Hacking

Categories: Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Module 01: Introduction to Basics of Ethical Hacking
Lesson 01: Intro To Ethical Hacking
Lesson 02: Types of Attacks
Lesson 03: Hacking Methodology
Lesson 04: Cyber Kill Chain
Lesson 05: Types of Attackers

Module 02: Foot-printing Active (Tool-Based Practical)
Lesson 01: What is Active Footprinting
Lesson 02: Different kinds of information gathered in Footprinting
Lesson 03: Tools for Active Footprinting = nmap, hping, Masscan Etc

Module 03: Foot-printing Passive (Passive Approach)
Lesson 01: What is passive footprinting
Lesson 02: Footprinting Through Whois
Lesson 03: Footprinting Through Website / Web services
Lesson 04: Footprinting Through search engine
Lesson 05: Footprinting Through DNS
Lesson 06: Footprinting Through Email
Lesson 07: Footprinting Through Network
Lesson 08: Footprinting Through Social Media
Lesson 09: Tools for Passive Footprinting – Google dorks, shodan, netcraft

Module 04: In-depth Network Scanning
Lesson 01: Overview of Network Scanning
Lesson 02: Scanning Methodology
Lesson 03: Host Discovery
Lesson 04: Port Scanning Techniques
Lesson 05: Scanning tools – nmap, netdiscover, arp-scan -1

Module 05: Enumeration User Identification
Lesson 01: Enumeration Concepts
Lesson 02: Network Basic Input Output System (NetBIOS) Enumeration
Lesson 03: Simple Network Management Protocol (SNMP) Enumeration
Lesson 04: Lightweight Directory Access Protocol (LDAP) Enumeration
Lesson 05: Simple Mail Transport Protocol (SMTP) Enumeration
Lesson 06: Domain Name System (DNS) Enumeration

Module 06: System Hacking Password Cracking & Bypassing
Lesson 01: Authentication
Lesson 02: Gaining Access
Lesson 03: Password cracking
Lesson 04: Password Cracking Techniques
Lesson 05: Steganography

Module 07: Viruses and Worms
Lesson 01: Introduction to Malware
Lesson 02: Types of Viruses
Lesson 03: Types of Worms

Module 08: Trojan and Back door
Lesson 01: Types of Trojans
Lesson 02: Components Of a Trojan

Module 09: Bots and Botnets
Lesson 01: Introduction to Botnets
Lesson 02: Characteristics of Botnets

Module 10: Sniffers MITM with Kali
Lesson 01: Introduction to Ettercap and Bettercap
Lesson 02: Practical on Ettercap
Lesson 03: Practical on Bettercap

Module 11: Sniffers MITM with Windows
Lesson 01: Introduction to Wireshark
Lesson 02: Practical on Wireshark

Module 12: Social Engineering Techniques Theoretical Approach
Lesson 01: Types of Social Engineering Attacks
Lesson 02: Human Based Social Engineering Attacks
Lesson 03: Computer Based Social Engineering Attacks
Lesson 04: Mobile Based Social Engineering Attacks

 

Module 13: Social Engineering Toolkit Practical Based Approach
Lesson 01: Practical on zphisher
Lesson 02: Practical on Social Engineering Toolkit (SET)

 

Module 14: Denial of Service (DOS) & Distributed Denial-of-Service (DDOS)
Attacks
Lesson 01: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Concepts
Lesson 02: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Attack Techniques
Lesson 03: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Tools
Lesson 04: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Protection Tools and Techniques

 

Module 15: Web Session Hijacking
Lesson 01: Session Hijacking Concepts
Lesson 02: Session Hijacking Techniques
Lesson 03: Session Hijacking Tools

Module 16: SQL Injection Manual Testing
Lesson 01: SQL Injection Concept
Lesson 02: Types of SQL Injection
Lesson 03: Working Of SQL Injection
Lesson 04: SQL Injection Methodology

 

Module 17: SQL Injection Automated Tool-Based Testing
Lesson 01: Practical on sqlmap
Lesson 02: Practical on Ghauri

Module 18: Basics of Web App Security
Lesson 01: Fundamentals of Web Application Security
Lesson 02: Common Vulnerabilities in Web Applications
Lesson 03: Best Practices for Web App Security

Module 19: Hacking Web servers
Lesson 01: Web Server Hacking Techniques
Lesson 02: Server Rooting Methods
Lesson 03: Securing Web servers

Module 20: Hacking Wireless Networks Manual CLI Based

Show More

What Will You Learn?

  • Ethical Hacking , Penetration Testing , Linux

Course Content

Chat Room
Chat Room

  • Chat Room
    00:00

Basic Rules

E-Books
How to Create an Ebook From Start to Finish [Free Ebook ... An ebook, short for 'electronic book,' is a digital form of a printed book designed to be read on devices like computers, tablets, or smartphones.

Secure Your Self

Introduction to Hacking
Intro

Lab Setup
Kali Linux Installation

Linux Interface
Linux Interface

Try Hackme

Information Gathering
Information Gathering

OSINT
Open Source Intelligence

Scanning
Scanning

Gaining Access

Dark Web
Dark Net

Cryptography

Steganography

Dos & DDos Attack
DoS: Denial-of-Service attack & DDos: Distributed Denial-of-Service Attack

Social Engineering

CTF
Capture the flag

Burpsuite

Mobile Hacking

SQL Injection

DVWA

Student Ratings & Reviews

5.0
Total 2 Ratings
5
2 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
3 years ago
The guy who teach here has excellent knowledge in hacking and moreover in teaching also,the right place to learn hacking is here.especially for Andhra people.he teaches very understandable and with patience,good and excellent anyway thnq guys to teachs us.
N
3 years ago
Very Nice Course