About Course
Module 01: Introduction to Basics of Ethical Hacking
Lesson 01: Intro To Ethical Hacking
Lesson 02: Types of Attacks
Lesson 03: Hacking Methodology
Lesson 04: Cyber Kill Chain
Lesson 05: Types of Attackers
Module 02: Foot-printing Active (Tool-Based Practical)
Lesson 01: What is Active Footprinting
Lesson 02: Different kinds of information gathered in Footprinting
Lesson 03: Tools for Active Footprinting = nmap, hping, Masscan Etc
Module 03: Foot-printing Passive (Passive Approach)
Lesson 01: What is passive footprinting
Lesson 02: Footprinting Through Whois
Lesson 03: Footprinting Through Website / Web services
Lesson 04: Footprinting Through search engine
Lesson 05: Footprinting Through DNS
Lesson 06: Footprinting Through Email
Lesson 07: Footprinting Through Network
Lesson 08: Footprinting Through Social Media
Lesson 09: Tools for Passive Footprinting – Google dorks, shodan, netcraft
Module 04: In-depth Network Scanning
Lesson 01: Overview of Network Scanning
Lesson 02: Scanning Methodology
Lesson 03: Host Discovery
Lesson 04: Port Scanning Techniques
Lesson 05: Scanning tools – nmap, netdiscover, arp-scan -1
Module 05: Enumeration User Identification
Lesson 01: Enumeration Concepts
Lesson 02: Network Basic Input Output System (NetBIOS) Enumeration
Lesson 03: Simple Network Management Protocol (SNMP) Enumeration
Lesson 04: Lightweight Directory Access Protocol (LDAP) Enumeration
Lesson 05: Simple Mail Transport Protocol (SMTP) Enumeration
Lesson 06: Domain Name System (DNS) Enumeration
Module 06: System Hacking Password Cracking & Bypassing
Lesson 01: Authentication
Lesson 02: Gaining Access
Lesson 03: Password cracking
Lesson 04: Password Cracking Techniques
Lesson 05: Steganography
Module 07: Viruses and Worms
Lesson 01: Introduction to Malware
Lesson 02: Types of Viruses
Lesson 03: Types of Worms
Module 08: Trojan and Back door
Lesson 01: Types of Trojans
Lesson 02: Components Of a Trojan
Module 09: Bots and Botnets
Lesson 01: Introduction to Botnets
Lesson 02: Characteristics of Botnets
Module 10: Sniffers MITM with Kali
Lesson 01: Introduction to Ettercap and Bettercap
Lesson 02: Practical on Ettercap
Lesson 03: Practical on Bettercap
Module 11: Sniffers MITM with Windows
Lesson 01: Introduction to Wireshark
Lesson 02: Practical on Wireshark
Module 12: Social Engineering Techniques Theoretical Approach
Lesson 01: Types of Social Engineering Attacks
Lesson 02: Human Based Social Engineering Attacks
Lesson 03: Computer Based Social Engineering Attacks
Lesson 04: Mobile Based Social Engineering Attacks
Module 13: Social Engineering Toolkit Practical Based Approach
Lesson 01: Practical on zphisher
Lesson 02: Practical on Social Engineering Toolkit (SET)
Module 14: Denial of Service (DOS) & Distributed Denial-of-Service (DDOS)
Attacks
Lesson 01: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Concepts
Lesson 02: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Attack Techniques
Lesson 03: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Tools
Lesson 04: Denial of Service (DOS) / Distributed Denial-of-Service (DDOS) Protection Tools and Techniques
Module 15: Web Session Hijacking
Lesson 01: Session Hijacking Concepts
Lesson 02: Session Hijacking Techniques
Lesson 03: Session Hijacking Tools
Module 16: SQL Injection Manual Testing
Lesson 01: SQL Injection Concept
Lesson 02: Types of SQL Injection
Lesson 03: Working Of SQL Injection
Lesson 04: SQL Injection Methodology
Module 17: SQL Injection Automated Tool-Based Testing
Lesson 01: Practical on sqlmap
Lesson 02: Practical on Ghauri
Module 18: Basics of Web App Security
Lesson 01: Fundamentals of Web Application Security
Lesson 02: Common Vulnerabilities in Web Applications
Lesson 03: Best Practices for Web App Security
Module 19: Hacking Web servers
Lesson 01: Web Server Hacking Techniques
Lesson 02: Server Rooting Methods
Lesson 03: Securing Web servers
Module 20: Hacking Wireless Networks Manual CLI Based
Course Content
Chat Room
-
Chat Room
00:00
