ETHICAL HACKING

ETHICAL HACKING


₹ 11999

    

75 HRS

Networking is the core for every software industry. Understanding the fundamentals of networking is very important in today's job scenario. This course talks about networking fundamentals taking the students from scratch to the pinnacle of networking. Also we talk about hacking fundamentals to show students how network hacking works, analysing network packets demonstrate few hacking techniques.

Syllabus

Networking Fundamentals
1. Basics of Inter-networking
2. Different types of networking devices; Routers, Switches, Bridges, Hubs and others and their working.
3. Connecting different devices with the help of Cables and Connectors.
4. Topologies and Demonstration of Packet Flow in a simple network with the help of Network Simulation Software i.e Packet Tracer.
5. In depth knowledge of networking models- OSI & TCP/IP model, Cisco's three layer model.
Working of all layers and protocols associated with each layer Data flow according to the reference model
6. Difference between the three models.
7. IP Addressing Scheme: IPv4 and IPv6
8. What is an IP Address? Why we need IP address?
9. Configuring IPv6 and IPv6 on Routers and Switches
10. Networking Basic Commands
11. Application Protocols
12. Understanding Linux Files and Network Tooling
13. Routing: Connecting two different Networks

IP Routing Basics
1. Routing Theory and Routing Protocols- Static, Dynamic

Switching: Communication within a Network
1. Switching Fundamentals
2. Basic Switching Concepts - using switches in a network.
3. Spanning-Tree Protocol: Fundamentals and Working,
4. Implementing all the switching concepts on packet tracer and checking connectivity.
HandsOn :
5. Cisco Packet Routing
6. GNS3
7. The What of Ethical Hacking
8. Concept of Ethical Hacking: Legal or illegal??
9. Cyber Security and Ethical Hacking : Explained
10. Actual Definition of Hacking v/s Public
11. Perspective/who is Hacker (IT Security Expert)??
12. How to become a Hacker?
13. Why do we need Hackers?
14. Hackers Methodology and Innovation: Case Studies
16. Difference between Hacker's and Cracker's(Criminals)?

Categories of Hackers
1. Coders
2. Admin's
3. Script Kiddies
4. Categories of Hackers(As per Working):

How to secure yourself from Attackers
1. How to Stop Attackers
2. Indian Cyber Law
3. Emails: Exploitation & Security
4. E-mail Forgery and Spamming
5. Anonymous Mailing techniques
6. Using Anonymous Mailers
7. Using Self Developed PHP Script
8. E-Mail Bombers
9. Security to Anonymous Mailing
10. Attacks on E-Mail Password
11. Attackers Anatomy and Psychology while hacking the passwords

Technical Attacks
1. Using Fake Websites: Phishing
2. DNS Re-Direction : Pharming
3. Hijacking the Authenticated
4. Session: Cookie Stealing
5. Securing the E-Mail Passwords
6. Password Policies
7. Benefits of SSL Certificate for a User.
8. Anti - Trust Policies
9. Email Forensics

Introduction to System Software's
1. Windows
2. Ubuntu(Linux)
3. Back Track(Live OS)
4. Windows Security Components and Working
5. Windows Security Components
6. User Account Login Process
7. Windows Registry Structure
8. Introduction to Virtual Machines
9. What is Virtual Machine
10. Virtual System Architecture
11. Implementation of Virtualization
12. VMWare Workstation

Installation and Usage
1. Windows
2. Linux
3. Oracle Virtual Box
4. MS Virtual PC
5. Attacks on Windows Login Password
6. Other Security Measure
7. BIOS User and Supervisory password
8. Biometric
9. Implementing Syskey Encryption
10. Windows Inbuilt Flaws and Security Loopholes
11. Hidden Accounts
12. Backdoor Via Sticky Keys
13. Administrator Escalation on Limited
14. accounts
15. Invading into Computer System
16. Recovering BIOS Password
17. Recovering Biometric Password
18. Disabling Syskey Encryption
19. Optimizing Windows Computer System
20. Steganography
21. Hiding Files behind an Image
22. Alternate Data Streaming on NTFS File System
23. Restrict Hackers into box
24. Restricting Access to Files & Folders
25. ACLs Calculation
26. Configuring Strong Password
27. Changing Boot Order
28. BIOS Password
29. Physical Security

Malwares: Trojan, Viruses & Worms
1. What are malwares?
2. Trojans
3. What is a Trojan?
4. Types of Trojans
5. Trojan Attack Methods
6. Direct Connection
7. Reverse Connection
8. Some Well Known Trojans
9. Detection of Trojan
10. TCP View
11. Process Viewer
12. Process Explorer
13. Viruses
14. Working and Functionality of Viruses

Development
1. Batch Programming
2. Programming
3. Development of Folder lockers
4. Registry tweaks and Tricks
5. Developing Professional Security tools
6. Detection and Manual Removal
7. Introduction to the LAN(Local Area Networks)
8. Laptop as a Networking Device
9. Wireless Data Sharing
10. Internet in Networks Using USB Internet Cards

Introduction to MAC Address
1. MAC Spoofing
2. Back-Track: Penetration Tool
3. Flaws and Security
4. Secure Network Configuration
5. Configuring Anti-Sniffers
6. MAC Filtering Restrictions
7. Configuration of WPA2 Key
8. Web Server attacks and Security
9. Introduction to Web Application Security
10. Understanding Attack Vectors

Web Application Attacks
1. SQL Injection
2. Basic Injection
3. Advance Injections
4. Google Dorks - Using Google as an Expert
5. Cross Site Scripting: XSS
6. JavaScript Based Attacks
7. Ajax Based Attacks
8. Directory Traversal Attacks
9. Sever Side code Retrieval
10. Putting breaks on Web Application attacks
11. Proper Monitoring
1. Proper Input Validation
12. Deny Google to your Website
13. Finding Backdoors in the Website
14. Secure Programming
15. Mozilla Firefox as a Hacking tool
16. Bypassing Proxy - Intermediate
17. and we have much more in the bag for you