You are on page 1of 3

BASIC 

ETHICAL HACKINTG & CYBER SECURITY 
TRAINING.  
 TOPICS COVERED IN ETHICAL HACKING & CYBER SECURITY TRAINING. 
 Course Curriculum 
Module I

Introduction to Ethical Hacking


Network Basics
Ethical Hacking Start Up Basics
Information Gathering
Basics of Web Development
Phishing

Module II

Fake Mail
Further practical
DNS Spoofing
Man In The Middle Attack
Cross site scripting attack
WIFI Hacking

 Also there are end numbers of topics which are covered in


ethical hacking it depends upon the courses you select in this
see the table for more info.
 

  PROGRAM NAME  DURATION  MODE  CERTIFIED BY  MATERIAL IF ANY 


SR.NO 
 
1  Basic Ethical Hacking  15 Days or  Virtual  AICRA  Soft tool kit 
(Networking &  30 Hrs 
Information Security) 
2  Advanced Certificate in  30 Days or  Virtual  AICRA  Soft tool kit 
Ethical Hacking  60 Hrs 
(Networking & 
Information Security) 
3  Ethical Hacking  30 Days  Virtual  AICRA  Soft tool kit 
(Training & Internship) 
 

Advanced Ethical Hacking Course.


Ethical hacking provides an objective analysis of the business’s security. An
organization engaged in ethical hacking usually has no knowledge of the business’s
systems except those which they can easily tap.

These hackers typically scan for weaknesses, prioritize targets, test entry points, as
well as create a strategy which can best put their resources in a great advantage. After
the security measures are assessed, the ethical hacking company can then prescribe
re-mediation advice for the business’s unique security objectives, capabilities, and IT
environment.

The business entity can do fine-tuning of their security tools, make adjustments on
their security policy and efforts, as well as identify any required training.
This training will significantly benefit security officers, network administrators,
firewall administrators, auditors, security professionals, site administrators,students
and anybody who is concerned about the integrity of their network infrastructure.

MODULES 1

Introduction to Ethical Hacking


Basics of operating systems, databases and networking
Ethical hacking - How To
Concepts of TCP/IP and OSI model
Detail IP/MAC spoofing & security
Foot-printing
Web search hacking
Scanning and types
Password cracking and system security
Pentesting with Backtrack & Kali Linux
Social engineering attacks & security
Cryptography
Steganography (audio,video,text and image)
Bypassing firewalls
IDS/IPS and honeypot
SQL injections(SQLI) manual, automated and security.

MODULES 2
Cross site scripting(XSS) manual, automated and Security
DDOS attacks, buffer and stack overflow
Mobile E-hacking and security
Spamming attacks
Concept of ATM security and hacking
Live demonstration on dedicated server - (How Hackers Hack)
USB hacking technique / switch blades
Credit card and debit card hack attacks
Protocols vulnerabilities and exploiting through sniffers
Email hacking and security
Virus, trojan, worms and security
Reverse engineering and security
Wi-Fi security
Physical security threats
Understanding ISO 27001 standards
Cyber laws in India

The trainer which we have for ethical hacking is teaching


this latest topics of ethical hacking tour Mumbai police
with all the project , practials and theory.

You might also like