Job Role

Ethical Hacking

Fortify cybersecurity defenses with our ethical hacking course - master penetration testing and defensive strategies.

Course Syllabus

1

Introduction to Ethical Hacking

  • Ethical Hacking
  • Information Assurance (IA)
  • Risk Management
  • Incident Management
  • PCI DSS
  • HIPPA
  • SOC
  • GDPR
  • Domain in Cyber Security
  • Ethical Hacking Stages
  • Linux
  • Kali Lab Installation
2

Foot Printing and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures
3

Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures
4

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Technique
  • Enumeration Countermeasures
5

Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
6

System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs
7

Malware Threats

  • Malware, Components of Malware
  • APT
  • Trojan
  • 9 Types of Trojans
  • Exploit Kits
  • Virus
  • Virus Lifecycle
  • Types of Viruses Ransomware
  • Computer Worms
  • Fileless Malware
  • Malware Analysis
8

Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
9

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures
10

Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDOS Case Study
  • DoS/DDoS Attack Countermeasures
11

Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures
12

Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
13

Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
14

Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security
15

Sql Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • SQL Injection Countermeasures
16

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
17

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
18

Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Cloud Security
19

Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Disk Encryption
  • Email Encryption

Ready to Start Learning?

Join thousands of students who have transformed their careers with our expert-led training.