Ethical Hacking Course

An ethical hacker (also known as a white hat hacker) is the ultimate security professional. Ethical hackers know how to find and exploit vulnerabilities and weaknesses in various systems-just like a malicious hacker (or a black hat hacker). In fact, they both use the same skills; however, an ethical hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in. An ethical hacker's role is similar to that of a penetration tester, but it involves broader duties. They break into systems legally and ethically. This is the primary difference between ethical hackers and real hackers-the legality.

Duration :-2 Months

Who Can take this course - Target Audience :-

  1. 10th & 12th class students
  2. Undergraduates, Graduates and Post-Graduates
  3. Post graduate students - BCA, MCA, B.Tech , M.Tech
  4. Security officers, Auditors, Security professional's site administrators

Pre-requisites for the Class: -

  1. Basic Computer Knowledge

Course Content: -

Networking Concept

  1. What is Network?
  2. What is IP and types?
  3. Internet working
  4. Domain Name
  5. Electronic Mail
  6. Architecture and Services
  7. Ports and Types of Ports
  8. Introduction to Web Browser

Overview of Cyber Law

  1. Introduction To Cyber Law
  2. Cyber Laws Indian
  3. Technical Aspect Of Indian Cyber Law
  4. IT ACT 2000 & 2008
  5. Internet Crimes And Frauds
  6. Cyber Law Cases In India
  7. Organization Under Cyber Laws
  8. Advantages Of Cyber Laws

Concept of virtualization technology

  1. Need & Advantage Of Virtualization
  2. Requirements for virtualization
  3. Creating virtual machines and optimization performance
  4. Installing OS (Windows and Linux) On Virtual Machines
  5. Virtual networking what and why?

Windows Hacking & Security

  1. Introduction Windows Security
  2. User Accounts Security, Attacks and countermeasure
  3. Hacking Into System by Changing Passwords
  4. Getting Access to System By Elevating Privileges
  5. Finding Out the Passwords Of Windows
  6. Bypassing the Windows Security

Denial of Service Attack(DOS-Attack)

  1. What is a Denial of Service Attack?
  2. What is Distributed Denial of Service Attacks?
  3. DOS Attack Techniques
  4. Detail Study on DoS Attack Tools

Proxy Server & Virtual Private Network (VPN) Technology

  1. Proxy And Types Of Proxies
  2. Why Hackers Use Proxy?
  3. How To Hide IP Address While Chatting
  4. How To Open Block Website In College/Companies
  5. Convert Your Machine As Proxy Server With HTTPS Proxy
  6. Advantage And Disadvantage Of Proxy
  7. How Proxy Hack Your Passwords Etc
  8. What Is VPN?
  9. Why We Use VPN
  10. Advantage & Disadvantage Of VPN
  11. Free VPN

Email/Social Sites Hacking & Security Issues

  1. Analysis Email Attacks (Live Demo) Manually & Automatic
  2. Cookies Stealing (Session Hijacking) of All Big Mail Servers
  3. Phishing Attacks ( Normal & Advanced )
  4. Analyzing Fake & Real Profiles & Email Accounts
  5. Fake Mailing Attack
  6. Email & Fake Profile Tracing
  7. Facebook Phishing Attacks
  8. Facebook Account security with Email & SMS Notifications

Wireless Hacking

  1. Wireless Standards
  2. Common Vulnerabilities in Wireless Devices
  3. Encryption Standards Used in Wi-Fi
  4. WEP Cracking
  5. WPA/WPA2 Cracking
  6. WPS Cracking
  7. Solve Security challenges

.........And many More hacking ... Security

  1. Facebook/mail Account Security
  2. Whatsapp Security
  3. Andriod phone Security

Recommended next Course after this course: -

  1. LPT

Ethical Hacking and Cyber Security and overview

  1. Cybercrime scenario in India and worldwide
  2. Short description about hacking vs Ethical hacking
  3. Skill Profile of a Hacker
  4. Some Famous Hackers and Groups
  5. Cyber World
  6. Advantage and Disadvantage of Cyber world
  7. Types of Hackers
  8. Classes of Hacker
  9. Who is a Hacker
  10. Security Challenges
  11. Skills required for an Ethical Hacker

Computer Virtualization technology & LAB setup

  1. Introduction To Cyber Law
  2. Cyber Laws Indian
  3. Technical Aspect Of Indian Cyber Law
  4. T ACT 2000 & 2008
  5. Internet Crimes And Frauds
  6. Cyber Law Cases In India
  7. Organization Under Cyber Laws
  8. Advantages Of Cyber Laws

Information Gathering(Foot printing)

  1. What Is Information Gathering & Why Hackers Need This?
  2. Types Of Information Gathering
  3. Information Gathering Using Websites
  4. Information Gathering Using Software
  5. Search Engines- Smart Way Of Information Gathering
  6. Ping
  7. Who-is Lookup
  8. People Search
  9. DNS Lookup
  10. Benefits of Footprinting

Data Recovery

Steganography & Cryptography

Desktop exploitation & Data hidding

Fake Calling and SMS

Mobile Phone Hacking

  1. Use of mobile in hacking
  2. Hidden funcion of mobile
  3. Rooting

Hacking by Viruses, Trojans, Keyloggers & Spywares

  1. What is viruses?
  2. What is Trojan?
  3. Trojans/viruses Attack
  4. Different way a Trojan Can Get Into A System
  5. How Attacker Bypass Your Antivirus By Trojans

Google Hacking and Google Hacking Database

  1. Introduction and Working of Search Engines
  2. List of Common Search Engines on Web
  3. Comparing and Choosing Best Search Engine
  4. Google For Hacking Search Engines
  5. Finding Admin Pages and Weakness In Site
  6. Security against Search Engine Hacking

SQL Injection

  1. What is SQL Injection..??
  2. Accessing iPhone File Systems
  3. How Web Applications Work?
  4. SQL Injection Detection
  5. Types of SQL Injection
  6. How to Defend Against SQL Injection Attacks..??

Linux Training

  1. What is linux & how to operate this OS
  2. Use of linux
  3. Wi-Fi cracking & security
  4. Pentesting(Site Cloning)
  5. Network find
  6. Network scanning
  7. DNS Hacking(Server hacking)
  8. What is DNS..??
  9. DNS Attack
  10. FACEBOOK/Any Mail id HACKED!!!
  11. Security
  12. Wifi jammer
  13. Armitage
  14. NMAP
  15. Honeyports
  16. Terminal function

Cyber Crime Investigation(Case Study)

  1. Introduction to Cyber Crime Investigation.
  2. Types of Cyber Crimes.
  3. Report Cyber Crimes.
  4. Investigating Emails (Email Tracing)
  5. Online email header analysis.
  6. Investigating Phishing Cases.
  7. Investigating Data Theft Cases.
  8. Investigating Facebook Profile Impersonation Cases