Ethical Hacking Training

Note: We are not authorised partners of any of these vendors

Ethical Hacking Training

Ethical Hacking

Ethical Hacking is the process of evaluating the security of a computer system by simulating an attack by a malicious hacker. The course is designed to teach students how to think like a hacker, providing them with a deep understanding of security issues and concerns. We encourage lively debates about pertinent ethical and security issues. Students develop the hacker mindset, determined to ‘do their bit’ to improve security in the world of Computing. These professionals will be proficient in identifying, isolating and responding appropriately to threats as fast as possible in order to effectively minimize damage.

Today software companies whether government or private is dealing with hardcore security problems. Crackers and intruders enter databases and web servers for stealing, damaging and spreading of irrelevant programs. This brings in the need of ethical hackers and courses on ethical hacking. Ethical hacking in India is grabbing the market fast and is doing a brisk business. It is the job of ethical hackers to protect the networking infrastructure and corporate websites. These moral hackers have the legal consent to penetrate into a computer or software system by using similar tools and techniques of that of a cracker. But they do not intend to steal information or damage the software system.

Prerequisite:

Strong knowledge of TCP/IP

Familiar with windows/Linux operating system

Who should attend this course?

Anybody who want to secure their confidential data from attackers.

Students who are willing to become ethical hackers

System/Network administrators who are responsible for protecting organizations data.

Duration:

5 Days

Course Outline:

Module-1: Introduction to Information Security

Introduction to Hacking

Building a Pentest Lab

Module-2: Pentest methodologies

Description of different pen Testing Methodologies

Open Source Security Testing Methodology Manual (OSSTMM)

Information Systems Security Assessment Framework (ISSAF)

Open Web Application Security Project (OWASP) Top Ten

Web Application Security Consortium Threat Classification (WASC-TC)

Module-3: Information Gathering

What is Information Gathering

Active & Passive Information Gathering

Google as a Information Gathering Agent

Web based Footprinting

Addons and Tool Based Footprinting

Site For Footprinting

Module-4:iding Identity(Proxy & vpn)

Online Proxy

Proxy Tools

CGI Proxy

Tab, Browser, System, Network Based Proxy

VPNs

Bypass Restrictions Using Proxy and VPNs

Module-5: Scanning & Enumeration

Overview of TCP/IP 3 way Handshake

Stealth scans

Nmap scanning methods

Nmap Realworld scans

Nmap Script Engine

Evading firewall/ IDS

Firewall scanning using HPING3

Online Scanning

Some useful scanners

Autoscan, Superscan, Unicornscan

Introduction to Enumeration

SNMP Enumeration

Banner grabbing

Using Netcat

Using Hping3

Module-6: Advance Google Hacking

Google and Its Working

Dork For Google Hacking

Tools For Google Hacking

Web Crawling Tools

Google as Vulnerability Scanner

Module-7: System Hacking(Windows XP, Windows 7 & 8)

Password Cracking

Password Resetting

Login Without Entering Password

Password In Plain Text

Backdoor Installation

Guest to Admin Login

Securing System

Module-8: Application Password Cracking

Rar password cracking

Ms Office Document Password Cracking

FTP Password Cracking

SSH Password Cracking

Router & Switch Password Cracking

Module-9: Steganography & Cryptography

Introduction to Stenography

Introduction to Cryptography

Data Hiding Behind Images, Videos Files Etc

Data Hiding Tools

Cryptography

Use of cryptography in Data Hiding

Module-10: Social Engineering Attacks

What is Social Engineering

Types of Social Engineering

How to Perform Social Engineering Attack

Prevention Against Social Engineering

Module-11: Network Attacks & Security

DOS & DDOS Attack

DNS & ARP Poisoning

Sniffing

SSL Striping ( MITM )

Countermeasures

Module-12: IDS, IPS & Honeypots

IDS & IPS

Installation, Configuration & Maintenance

Honeypots

Types Of Honeypots

Implementation of Honeypots

Module-13: Wireless Password Cracking

WEP Cracking

WPA/WPA2 Password Cracking

WI-FI Router Password Cracking

Wireless Security Measures

Module-14: Vulnerability Assessment & Penetration Testing

Introduction to VA-PT

Key Benefits & Difference

Opensource VA-PT

Tool Based VA-PT

Module-15: Miscellaneous

Nexpose

Core Impact

Veil Framework

Firewall Pentest

VOIP Hacking

EAST Framework

Module-16: Reporting

Sample Pentest Agreement

Executive Report

Technical Report

Developer Report

Download Soft Copy