Ethical Hacking


A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. Following are the learning objectives of this course:

Who Should Take-up This Course

Eager to learn ethical hacking once and for all

Looking forward to a career in cyber security

Want to learn Python programming for ethical hacking

Willing to write their own cyber security tools

Passionate for Kali Linux and general ethical hacking tools

Looking to enhance IT skills and be prepared for hacker attacks

What are the prerequisites for taking this course

This course only aims to teach for people who want to become Cyber Security Professionals, Ethical Hackers and Pentesting Specialists. All students should stay within legal boundaries in order to avoid any legal action against themselves.

Course Content

  • Introduction to Hacking
  • What is Hacking?
  • Ethical hacker
  • Information Security Laws and Standards
  • Information Security
  • Incident Management
  • Data breaches and malware trends
  • Threat modeling
  • EISA, Vulnerability Assessment, VA research, info warfare
  • Foot Printing
  • Footprint through Search engines
  • Google hacking-dorking
  • Web crawler / Spider
  • Footprinting through Websites
  • Whois lookup
  • Whois lookup
  • Traceroute, Looking glass server, BGP Tools
  • NSLookup
  • SNMP – Simple Network Management Protocol
  • Footprinting through email tracking
  • Network Scanning
  • Introduction to Network scanning
  • Network port scanning
  • Network scanning tools
  • Nmap – Network mapper – scanner
  • Network monitoring tools – Open source
  • Network monitoring tools – Commercial
  • Ping – Ping sweep
  • HPing and FPing demo on Kali Linux
  • HPing and FPing
  • Proxy Servers 1
  • Network Enumeration
  • Network Enumeration introduction
  • Network enumeration tools
  • Scanning and Enumeration Countermeasures
  • System Hacking
  • Hacking Methodology
  • Password cracking
  • Brute-force attack
  • Ophcrack – Windows password cracker
  • Custom Word List generator
  • Crunch wordlist generator
  • Pwdump – Password Dumper and Hash Suite
  • Hashcat – advanced password recovery tool
  • Malware Trojans
  • Trojan horse (Trojan) introduction
  • Beast Trojan – Remote Administration Tool (RAT)
  • Beast Trojan demo – Educational purpose ONLY
  • Process explorer
  • Malware countermeasures
  • Malware – Virus and Worms
  • Virus introduction
  • How the virus works
  • Virus removal
  • Stealth techniques
  • Virus maker tools
  • Packet Sniffers
  • Packet Sniffers
  • Wireshark
  • Countermeasures-Sniffing
  • Xplico
  • Social Engineering
  • Social engineering introduction
  • Social engineering techniques
  • Social engineering countermeasures

Duration: 28 days