rapv014 Instructor led online traning for tical Hacking| LearnSocid
ETHICAL HACKING
Leam how to build secure IT systems
37 Leamers 3 Reviews Instructor Led online course
Details Curriculum Batches Instructor Reviews Learners
Pre-requisite setup required for hacking
* Operating Systern
* Introduction Live CD Operating Systems and Distributions
+ Introduction to Virtualization
+ Implementing Virtualization
+ Basics of Networking Implementing Networking Concepts in Virtualization
‘+ Setting up PC for hacking practice
Module 1: Introduction to Ethical hacking
* Difference between hacking and Ethical Hacking
* Types of hackers
+ Phases of conducting hacking
* Case studies
Module 2: Ethics and Rules
* Hackers and hacking methodology
+ Malicious hacker strategy
* Steps to conduct Ethical hacking
* Hiding your identity while you hack
phew Jearnsecalcomfcoursa9fEtvcal-Hackingt
FAQ's
“4rapvao14 Instructor led online traning for tical Hacking| LearnSocid
Module 3: Reconnaisance and Footprinting
* Get to know how hackers gather information about the target
+ Information gathering on websites
* Scanning website
+ Finding admins
Module 4: Google Hacking
‘+ What is Google?
* Using google as hacking tool
* Finding vulnerability website using Google
* Using special operators
* Live attacks performed by malicious hackers.
Module 5: Scanning Networks
+ Introduction to Scanning
* Types of Scanning
* IPScanner
+ Nmap
* Generating reports.
Module 6: Enumeration
* Banner Grabbing
* DNS Zone Transfer
* Using Dig
* HTTP Recon
Module 7: Sniffing
* What is sniffing
* Types of sniffing
* Using weakness of hardware device
+ Using sniffing to get sensitive data
* Man in the middle attack
phew Jearnsecalcomfcoursa9fEtvcal-Hackingtrapvao14 Instructor led online traning for tical Hacking| LearnSocid
Module 8: Introduction to Malware(Malicious Software)
+ Malware Unleashed
+ Detailed Study of Virus, Worms, Trojan Horse
+ Technique to check whether your antivirus is working properly or not.
+ How anti-virus work
Module 9: Introduction to Cryptography
* Encryption
* Decryption
* Demo on Cryptography
* Creating secured password protected area in Harddisk
Module 10: Trojans
* Creation of Trojan
* Hiding Trojan in a legitimate program
* Gaining control on others system.
* Detection and removal of Trojans
* Live hacking in LAN Environment
Module 11: Email Hacking
+ Tracing an email
‘+ Email bombing
+ Using phishing page
* Keyloggers
Call us @ +91 9533166166 (India)
Search Courses here.
Module 13: Website Hacking
* Common Web Attacks
+ Understanding Web Architecture
* SQL injection
+ XSS
ip: Jearnsccial comicourse29hical Hacking