• Classroom Training   • Online Training   • Corporate Training  • Live Projects & Guidance 

Ethical Hacking

Courses Information

Ethical hackers learn and perform hacking in a professional manner, based on the direction of the client, and later, present a maturity scorecard highlighting their overall risk and vulnerabilities and suggestions to improve.

Government agencies and business organizations today are in constant need of ethical hackers to combat the growing threat to IT security. A lot of government agencies, professionals and corporations now understand that if you want to protect a system, you cannot do it by just locking your doors

This course is highly practical but it won't neglect the theory. This course will take you from a beginner to a more advanced level.

Curriculum
Module 1 - Introduction to Ethical Hacking
  • Overview of Current Security Trends
  • Understanding the Elements of Information Security
  • Information Security Threats & Attack Vectors
  • Hacking Concepts, Types & Phases
Module 2 – Footprinting & Reconnaissance
  • Understanding Footprinting Concepts
  • Using Advanced Google Hacking Techniques
  • Understanding WHOIS & DNS Footprinting
  • Footprinting Countermeasures
Module 3 – Scanning Networks
  • Overview of Network scanning
  • Techniques to check for Live Systems & Open Ports
  • Understanding Banner Grabbing
  • Overview of Vulnerability Scanning
  • Using Proxies & Anonymizers for attack
  • Scanning Countermeasures
Module 4 – Enumeration
  • Understanding Enumeration Concepts
  • Various Techniques of Enumeration
  • Enumeration Countermeasures
Module 5 – Vulnerability Analysis
  • Understanding Vulnerability Analysis Concepts
  • Vulnerability Scanning
Module 6 – System Hacking
  • Overview of CEH Hacking Methodology
  • Techniques to Gain Access to the System
  • Understanding Privilege Escalation
  • Techniques to Create & Maintain Remote Access to the System
  • Overview of Rootkits & Steganography
  • Techniques to Hide the Evidence of Compromise
Module 7 – Malware Threats
  • Introduction to Malware
  • Overview of Trojans, Virus & Worms
  • Understanding Malware Analysis
  • Different Techniques to Detect Malware
Module 8 – Sniffing
  • Overview of Sniffing Concepts
  • Overview of Trojans, Virus & Worms
  • Understanding MAC Attacks & DHCP Attacks
  • Understanding ARP Poisoning & DNS Poisoning
  • Various Techniques to Detect Sniffing
  • Sniffing Tools
  • Sniffing Countermeasures
Module 9 – Social Engineering
  • Understanding Various Social Engineering Techniques
  • Understanding Insider Threats
  • Impersonation on Social Networking Sites
  • Understanding Identity Theft
  • Social Engineering Countermeasures
Module 10 – Denial-of-Services
  • Understanding DoS/DDoS Attack Techniques
  • Botnet Network and DoS/DDoS Countermeasures
Module 11 – Session Hijacking
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Countermeasures
Module 12 – Evading IDS, Firewall and Honeypots Technology
  • IDS, Firewall and Honeypots Solutions
  • Different Techniques to bypass IDS, Firewall and Honeypots
  • IDS, Firewall and Honeypots Evasion Countermeasures
Module 13 – Hacking Web Servers
  • Understanding Web Servers and its Attacks
  • Understanding Web Servers Attack Methodology
  • Countermeasures against WebServers
  • Overview of Patch Management
Module 14 – Hacking Web Applications
  • Understanding Web Applications Threats & Hacking Methodology
  • Web Applications Countermeasures
Module 15 – SQL Injection
  • Various types of SQL Injection Attacks
  • SQL Injection Methodology
  • SQL Injection Countermeasures
Module 16 – Hacking Wireless Networks
  • Understanding Wireless Concepts
  • Understanding Bluetooth Hacking
  • Wireless Threats & Hacking Methodology
  • Wireless Encryption Algorithms
  • System Wireless Hacking Countermeasures
Module 17 – Hacking Mobile Platforms
  • Android Threats & Attacks
  • Understanding Mobile Device Management (MDM)
  • IOS Threats & Attacks
Module 18 – IoT Hacking
  • Understanding IoT Concepts
  • IoT Hacking Methodology
  • Understanding IoT Attacks
  • IoT Countermeasures
Module 19 – Cloud Computing
  • Understanding Cloud Computing
  • Cloud Computing Attacks
  • Cloud Computing Threats
  • Understanding Cloud Computing
Module 20 – Cryptography
  • Understanding Cryptography Concepts
  • Understanding Email & Disk Encryption
  • Understanding Public Key Interface (PKI)
  • Cryptography Attacks

Trending Courses