You are on page 1of 4
rapv014 Instructor led online traning for tical Hacking| LearnSocid ETHICAL HACKING Leam how to build secure IT systems 37 Leamers 3 Reviews Instructor Led online course Details Curriculum Batches Instructor Reviews Learners Pre-requisite setup required for hacking * Operating Systern * Introduction Live CD Operating Systems and Distributions + Introduction to Virtualization + Implementing Virtualization + Basics of Networking Implementing Networking Concepts in Virtualization ‘+ Setting up PC for hacking practice Module 1: Introduction to Ethical hacking * Difference between hacking and Ethical Hacking * Types of hackers + Phases of conducting hacking * Case studies Module 2: Ethics and Rules * Hackers and hacking methodology + Malicious hacker strategy * Steps to conduct Ethical hacking * Hiding your identity while you hack phew Jearnsecalcomfcoursa9fEtvcal-Hackingt FAQ's “4 rapvao14 Instructor led online traning for tical Hacking| LearnSocid Module 3: Reconnaisance and Footprinting * Get to know how hackers gather information about the target + Information gathering on websites * Scanning website + Finding admins Module 4: Google Hacking ‘+ What is Google? * Using google as hacking tool * Finding vulnerability website using Google * Using special operators * Live attacks performed by malicious hackers. Module 5: Scanning Networks + Introduction to Scanning * Types of Scanning * IPScanner + Nmap * Generating reports. Module 6: Enumeration * Banner Grabbing * DNS Zone Transfer * Using Dig * HTTP Recon Module 7: Sniffing * What is sniffing * Types of sniffing * Using weakness of hardware device + Using sniffing to get sensitive data * Man in the middle attack phew Jearnsecalcomfcoursa9fEtvcal-Hackingt rapvao14 Instructor led online traning for tical Hacking| LearnSocid Module 8: Introduction to Malware(Malicious Software) + Malware Unleashed + Detailed Study of Virus, Worms, Trojan Horse + Technique to check whether your antivirus is working properly or not. + How anti-virus work Module 9: Introduction to Cryptography * Encryption * Decryption * Demo on Cryptography * Creating secured password protected area in Harddisk Module 10: Trojans * Creation of Trojan * Hiding Trojan in a legitimate program * Gaining control on others system. * Detection and removal of Trojans * Live hacking in LAN Environment Module 11: Email Hacking + Tracing an email ‘+ Email bombing + Using phishing page * Keyloggers Call us @ +91 9533166166 (India) Search Courses here. Module 13: Website Hacking * Common Web Attacks + Understanding Web Architecture * SQL injection + XSS ip: Jearnsccial comicourse29hical Hacking

You might also like