0% found this document useful (0 votes)
1K views22 pages

Ethical Hacking Course

EDUCBA provides online courses on ethical hacking and cybersecurity that allow students to learn at their own pace and convenience. The courses cover fundamental skills like footprinting, scanning networks, password cracking, and web application hacking. Students learn practical techniques using tools like Nmap, Metasploit, and Nessus. The comprehensive training prepares students to test for vulnerabilities and help protect systems as certified ethical hackers.

Uploaded by

DeviL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views22 pages

Ethical Hacking Course

EDUCBA provides online courses on ethical hacking and cybersecurity that allow students to learn at their own pace and convenience. The courses cover fundamental skills like footprinting, scanning networks, password cracking, and web application hacking. Students learn practical techniques using tools like Nmap, Metasploit, and Nessus. The comprehensive training prepares students to test for vulnerabilities and help protect systems as certified ethical hackers.

Uploaded by

DeviL
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

At EDUCBA, it is a matter of pride

to us to make job oriented hands


EDUCBA
on courses available to anyone,
any time and anywhere. 

Learn at a time and place, and


pace that is of your choice.

Plan your study to suit your


convenience and schedule.

Ethical
Hacking
Course

Email Contact: info@educba.com www.educba.com


Ethical
Course Hacking Course
Overview Skills Features
In this Course you get to learn: We learn the following skills:
Course Duration-
This ethical hacking course learning all 57+ Hours
You get to learn how to become a
successful ethical hacker and the aspects of hacking from scratch to

penetration tester to test and capture advance level. Number of Courses

the vulnerabilities on the network and


The entire course comprises of video
provided area. Verifiable
tutorials where you will actually see Certificates

Ethical hacking is done in favor of the the practical implementation of all the

system with all due consent of the methods to hack several targets. 
Lifetime Access
system’s owner
You will learn all cyber security
jargon's. Later on, you will see how
Technical
those jargon's really work. You will be Excellence
taught more than one method to hack .
About Ethical Ethical
Hacking Hacking
Course Course

Ethical hacking is nothing but just a This is a Bundle Course that


way to hack with the target owner’s includes complete in-depth Ethical
consent. Sometimes it is also called Hacking Courses combined into
penetration testing. It is done to get one Complete Course.
real exposure to where the system is
vulnerable or prone to get This Bundle perfectly meets the
compromised. requisite of the industry and gives
you a better chance of being hired
Ethical hacking is mainly done to as a Ethical Hacking professional.
generate a report of all the existing
vulnerabilities so that those can be
repaired to protect it from malicious
users or hackers.
Ethical Hacking
Course V9

Section 1. Introduction Section 3. Scanning Network and


Section 5. Bypassing Linux Passwords
Enumeration
Introduction to Certified Bypassing Windows Passwords
Network Scanning
Ethical Hacker V9
Nmap TCP Connect Scan
How Ethical Hackers Terms Nmap Stealth Scan
Work Nmap Service and OS Detection
Nmap Timing Options
Nmap Scripting Engine

Section 6. Bypassing Linux


Section2. Foot Printing and Recon Section 4. System Hacking
Passwords
Foot Printing Vulnerability Assessment Introduction of Nessus
DNS Lookup Pen Testing Nessus Setup
More on DNS Lookup Netcat Hacks Nessus Scanning
Banner Grabbing SMTP Hacks FG Dump
Google Hacking DNS Poisoning Mimikatz
Social Engineering Hacking Passwords
Ethical Hacking
Course V9

Section 8. Web Application Section 9. Cloud Security


Section 7. Metasploit
Pentesting
Pentest Box and Metasploit
OWASP Top 10 What is Cloud Computing
Setoolkit Phishing
SQL Injection Characteristics of Cloud Computing
Setoolkit Payload and Listener
SQL Injection Continues Cloud Security Recommendation
MsfVenom Payloads
Broken Authentication
MsfVenom Payloads
Session Management
Metasploit Resource Scripts
Other Multiple Vulnerabilities
Privilege Escalation
Exploiting Passwords
Metasploit
Setoolkit Sandwich
Metasploit Bind Shells
More on Metasploit Bind Shells
Testing:01
The Fundamentals

Section 1. What is Ethical hacking Section 3. Footprinting and


Section 4. Phishing Attacks
and Penetration testing Reconnaisance

What is Footprinting DNS footprinting


Introduction ural La
Footprinting Objectives Determining Operation System

Footprinting Tools Phishing Attacks


Section 2. Installation and Google Hacking Connecting
Heuristic information database
SearchHeuristic
Configuration WhOIS lookup Nmap and ZenMap
SearchHeuristic Search

Kali Linux
Operating systems
Installing Operating Systems
Installing vmware tools
Configuring Kali Linux
Installing Kali Linux on
MacBook
Social Engineering
and Trojans

Section 1. Social Engineering and Section 2. Social Engineering and Section 3.Trojans and Backdoors
information Gathering information Gathering
Nmap and ZenMap further Introduction Types of Computer Malwares
continued Types of Social Engineering Dangerous viruses of all time
Social Engineering attacks Installing Rootkit Hunter
The Harvester
Spear-phishing Attack command prompt backdoor
WHOIS and dnsenum
Phishing Attack Backdoor & Gaining Access
Dnsrecon Mass mailer Attack Backdoor & Maintaining Access
Dnsmapping
Ethical
Meterpreter,
DNS and ICMP

Section 1 .Meterpreter Commands Section 2. DNS Spoofing Section 3 . ICMP Redirection

Command prompt backdoor PDF embedded Trojan Horse ICMP redirection

Meterpreter Backdoor Java Applet Attack Method Killing a Network


I am Root MITM Attack Ddosing unauthorised Network
Forensic escaping ARP Poisoning Driftnet
Hacking win7 SAM database DNS spoofing vs DNS poisoning EvilGrade
Jack the ripper DNS spoofing

Meterpreter commands DHCP Spoofing Section 4. Denial of Service Attack


Port Stealing
Introduction to DoS
DoS vs DDoS
Levels of Ddos Attacks
Preventing DDoS Attacks
DDoSing Windows 7 method
Hacking

Section 1. Hacking Android Section 3. Wireless Hacking

Hacking through Android WEP and WPA


Hacking Android via Kali Linux WPA2
1X standard
Wireless cracking via Kali
Section 2. Password Cracking

Introduction to Password Cracking Section 4 . Meterpreter

Password cracking Strategy


Activating payloads
Windows Password cracking
Linux Hash Cracking
Generating wordlist
CeWL cracking
Metasploit, SQL
Injection and
Cryptography

Section 1. Metasploit Section 3. Cryptography Section 4. Metasploit Database

Msfconsole explained Introduction Importing Databases


Msfconsole commands Hash Func and Oracle Method Exporting Databases
Exploits Birthday Theorem and Digital
Payloads Signature
Generating payloads Pros and Cons of Cryptography

Section 2. SQL injection

Intro to SQL injection


SQL injection to google dorks
SQL mapping via Kali Linux
Gathering Password and
cracking the hash
Advanced
Penetration
Testing

Section 1. Introduction Section 3. Python Port Scanner Section 5 . Hashdump

Introduction to Pentesting Python Port Scanner Hashdump and Password Phishing


More on Post Scanner Automated Handler with Resource
Section 2. NMAP
SMTP Mail Server

Creating a Virtual Pentesting Samba Exploit

Lab NFS Exploit


Grey Box and White Box
Nmap Scanning
The Malware
Advanced Scanning
Social Engineering
Nmap Zombie Scan
Nmap Timing Options
Section 4 . Android Exploitation
Nmap Pre-Existing Scripts
Simple Nmap Scripts Android Exploitation
Advanced
Penetration
Testing

Section 1. Web Attacks Section 2. Cracking Windows Section 3 . Hacking Computers

Knoppix Live Gaining System 32 Access and Remote hacking with Trojans
Termineter tool for hacking smart cracking SAM password remotely Further Continuation of Bypassing
Section 2. NMAP
meters
Advanced Remote hacking with Windows 7_8_10 password
Bitcoin mining and Password Cracking
System roles and Admin Access Bypassing Windows 7_8_10
with PIMP distro
Ophcrack with Kali Live and Konboot password
Browser Exploitation Framework(BeEF) Cracking Windows hash with
Packeting Sniffing via Ettercap Ophcrack
Session Hijacking via Hamster and
Ferret
Driftnet and Multiple Attacks

Resource Gathering and other


Digital
Forensics

Section 4. Digital Forensics Section 5 . Wireless hacking Section 6 . Other Operating Systems

Continuation of Flash Drive and Hard Continuation of Spoofing MAC Backbox and Parrot OS
Drive hack with Chip Genius address, Credential harvesting, and Continuation of Backbox and Parrot
Continuation of Data Recovery on bluetooth sniffing OS
Formatted Cell Phones Spoofing IP Address on any Gateway Tracing down files and Gathering
Data Recovery on Formatted Cell Spoofing MAC address, Credential Metadata
Phones harvesting, and bluetooth sniffing Continuation of Tracing down files
Continuation of Htestw, Low level Continuation of Spoofing IP Address and Gathering Metadata
formatting and Parition Imaging with on any Gateway
Safecopy Aircrack-ng
Htestw, Low level formatting and Continuation of Aircrack-ng

Parition Imaging with Safecopy Types of Wireless Attacks

Flash Drive and Hard Drive hack with Securing Wireless Infrastructure

Chip Genius and other and other


Digital
Forensics

Section 7. Android Hacking Section 8 . Enumerating Targets Section 9 . Scanning

Decrypting Whatsapp Database and Remote Connections and Port Proxy switcher and GNI
Scripts scanning Nessus and GNI
Creating Android Malware Faking Digital Certificates Netscan, Lansurveyor and Ping tools

Capturing Whatsapp Database and Other Pen testing Distributions and Nmap, Zenmap and LanGuard
Encryption Keys SSH control Monitoring TCP_IP connections
ID Server and Zenmap
Whatsapp Crypt Encryption Debian and Linux Basics Commands
IP Scanning and Network
Android USB Debugging tools and other Aggressive Scanning
Infrastructure
WebSite Cloning and other
Digital
Forensics

Section 10 . FootPrinting and Section 11 . Introduction to Ethical


Reconnaissance Hacking
Web Data Extraction and Search Remote Connections and Port
Diggity scanning
Web Browsers and Privacy Faking Digital Certificates
Firebug and Httrack Other Pentesting Distributions and
Email Tracking SSH control
Gathering Information
Debian and Linux Basics Commands
NSLookup
Aggressive Scanning
Ping Utility
WebSite Cloning and other
Hacking Training
Course
Section 1 . Protecting
Section 2. General Hacking Methods Section 4. Internet Phishing
Online Identity
Types of phishing and Introduction to Attack Techniques internet phisping introduction
antiphishing level and Classes of Attacks phisping link manipulation
Intoduction to phishing Internet Application Security and phisping link and website
Action Needed When Identity Vunerablity phone phishing
Theft Hacking NetBIOS with example how to protect yourself from phishing
Reducing Risk of Online Identity Port Scanning
Theft ICMP Scanning
Section 5. Hacking
Tips for Protecting Online Identity
Section 3. Introduction
Discussion about Protecting introduction to computer security and
Online Identity Hacking through Android cyber crime
Antiphis Hacking Android via Kali Linux why cyber security
Types of hackers attacks and spoofing
Web spoofing and session hijacking
Dos and bufferoverflow attacks
Passwords attacks
Hacking Training
Course

Section 6 . Data Mining Section 8. Cyber Terrorism Section 9. More on Data Mining

introduction to data mining Introduction to cyber terrorism introduction of data mining

data mining sub types Dos and potential of cyber terrorism data mining applications

usage of data mining and Strength of internet explanation of kdd with diagram

controversies key steps in kdd process

goal data mining and bi


confluence of multiple disciplines
Section 7. Spam why not traditional data analysis
classification of data mining
introduction to spamming
data mining functionalities
Types of spamming and counteractions
interestingness of discovered patterns
General counteractions against
dmql
spamming
dmql example explanation and other
Damage caused by spamming
Hacking Training
Course

Section 10 . Cryptography Section 11. SQL injection Section 12 . Wi-Fi

cryptography introduction introduction to sql injection introduction to wifi


caesar and subposition statistics of sql injection history of wifi
cryptanalysis and types of working of sql query specification of ieee 802.11 standards
encryption used sql injection working privacy and security of wireless
private key structure of sql query network
aes structure difference of sql queries working and application of wifi
public and private keys prepare statements
public key and private key is dynamic candidate evaluations
formed in rsa how to protect from sql injection
rsa continued introduction to sql injection
digital signature and digital statistics of sql injection
certificate working of sql query
sql injection working
structure of sql query and other
Hacking Training
Course
Section 14. Advanced Wireless
Section 13. Wireless Hacking
Hacking
hacking internet connection introduction to wireless network

introduction access points


introduction and requirement in
use for wireless hacking
any wireless network
fakeap wifi tool wireless nic and wireless network
airjack tool for wifi standards
ieee wireless standards and
wireless communication
ppp protocol
eap protocol
x-509 certificates
leap cisco and extensible
authentication protocol
wep and wpa and other.
Frequently
Asked Questions

Why should we learn Tell me something about scope


Ethical hacking? in Ethical hacking.

order to protect your privacy and data, With the exponential growth on the internet, the
you must know how the malicious need to secure the system is also increasing
elements can trick you to hack into your parallel. All the organizations, regardless of their
system. If you are aware of how you size, need people who can protect them from
could be tricked, you will be extra ready security breaches. So it is certain that there are
to protect your critical information lots of opportunity in the field of cyber security
against the security breaches. which is going to be double in the near future.
Customer Reviews


Good course easy to follow the content. Very
basic and well explained. I just did not give 4
stars because the course is too short. It’s
actually so well explained and it was a great
learning experience. I will recommend it to
This course is well arranged and informative
Great course and self-paced. I signed up for it but
couldn’t complete during that year due to personal
reasons, Few months down the line I could still
access and complete this course. Videos are
detailed and easy to understand. The
and I think that the instructor put a lot of
anyone. Clear instructions, step by step. demonstration also plays a vital role in helping
effort on it and he knows how to make the
newbies like me. I will definitely recommend this
Satao Soumana long story short. Clear, easy to understand
course.
  and the instructor delivered the course in a
very smooth way and covered a lot of topics. Vidal E. Jow

Ahmad Abu Alrashteh


EDUCBA

Ethical
Hacking
Course
For Queries please contact:
Email : info@educba.com
www.educba.com

You might also like