Certified Ethical Hacking Engineer

Duration | 86 hours

THINKWorks is an idea derived with a vision to make quality Tech skill-oriented education available and affordable to every job aspiring youth of the nation. This created a need to get all stakeholders of education such as Students, Colleges, Institutes, communities, and Industry together. Leaners undergo this comprehensive program to develop Skills on Employability, Interview and Aptitude.

Prerequisites

Computer Skills | Linux Skills | Programming Skills | Basic Hardware Knowledge | Reverse Engineering | Cryptography Skills | Database Skill

Course Objectives

The purpose of ethical hacking is to evaluate the security of and identify vulnerabilities in target systems, networks or system infrastructure. The process entails finding and then attempting to exploit vulnerabilities to determine whether unauthorized access or other malicious activities are possible.

Things you will learn

We help our students at every stage, from the start of a course to the actual skill-building technique. Our curriculum covers the following.

Cyber Security, Ethical Hacking, and Penetration Testing

  • Introduction
  • Structure
  • Objectives
  • The Ten Thousand Feet View
  • Cyber Security
  • Free comic strip subscription service
  • Electronic health record service
  • Ethical Hacking
  • Phases of a Hack
  • Penetration testing
  • Conclusion

Prerequisites and Syllabus

  • Introduction
  • Structure
  • Objectives
  • Certified Ethical Hacker
  • Version 10 & 11
  • Prerequisites
  • Modes of study and examination
  • Option 1: ECC Exam voucher
  • Option 2: VUE Exam voucher

Aptitude

  • Introduction
  • Structure
  • Objectives
  • Information Security and Penetration Testing
  • EC-Council CEH

Reconnaissance

  • Introduction
  • Structure
  • Objectives
  • Understanding Reconnaissance
  • Financial Information
  • Technology Stack
  • Workforce and Clientele
  • Operating Environment
  • Network Configurations
  • Web content
  • Conclusion
  • Test Your Understanding

Social Engineering

  • Introduction
  • Structure
  • Objectives
  • Social Engineering: The Bookie Story
  • Social Engineering Methodology
  • Social Engineering Techniques
  • Tools of Social Engineering
  • Social Engineering Countermeasures
  • Conclusion
  • Test Your Understanding

Scanning Networks

  • Introduction
  • Structure
  • Objectives
  • Anatomy of a Computer Network
  • Live Host Discovery
  • Port Scan and Service Discovery
  • TCP Scan
  • UDP Scan
  • Banner Grabbing
  • Network Mapping
  • Conclusion
  • Test Your Understanding

Enumeration

  • Introduction
  • Structure
  • Objectives
  • Enumeration as a successor to network scan
  • NetBIOS enumeration
  • SNMP Enumeration
  • LDAP enumeration
  • NTP enumeration
  • NTP enumeration commands
  • SMTP enumeration
  • DNS enumeration
  • Conclusion
  • Test Your Understanding

Vulnerability Assessment

  • Introduction
  • Structure
  • Objectives
  • Process Overview
  • Residual Risk
  • DevSecOps
  • Conclusion
  • Test Your Understanding

System Hacking

  • Introduction
  • Structure
  • Objectives
  • System hacking stages
  • Password cracking
  • Password storage in modern systems
  • Security Account Manager (SAM)
  • NTLM Authentication
  • Kerberos authentication
  • Rainbow tables
  • Backdoor Entry – Trojans
  • Password cracking defense checklist
  • Privilege escalation
  • Horizontal privilege escalation
  • Vertical privilege escalation
  • DLL hijacking
  • Executing application
  • Remote execution tools
  • Hiding files and covering tracks
  • Conclusion
  • Test Your Understanding

Session Hijacking

  • Introduction
  • Structure
  • Objectives
  • TCP and Web sessions
  • Network-level session hijacking
  • TCP session hijacking
  • UDP hijacking
  • Application-level session hijacking
  • Countermeasures to session hijacking
  • Conclusion
  • Test Your Understanding

Web Server Hacking

  • Introduction
  • Structure
  • Objectives
  • Web server
  • Tools for web server hacking
  • Conclusion
  • Test Your Understanding

Web Application Hacking

  • Introduction
  • Structure
  • Objectives
  • Tools used in web application hacking
    Conclusion
  • Test Your Understanding

Hacking Wireless Networks

  • Introduction
  • Structure
  • Objectives
  • The wireless connectivity
  • Wireless standards
  • 802.11a
  • 802.11b
  • 802.11g
  • IEEE 802.11ac (Wi-Fi)
  • 802.16 (WiMAX)
  • Bluetooth
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • WPA2
  • WPA3
  • Wireless Hacking Methodology
  • Wireless network discovery
  • Wireless network mapping
  • Wireless network analysis
  • Wireless network attacks
  • Deauthentication attack
  • WPA Handshake Capture
  • Man-in-the-Middle Attack (MITM)
  • Wireless Honeypots
  • Conclusion
  • Test Your Understanding

Hacking Mobile Platforms

  • Introduction
  • Structure
  • Objectives
  • Mobile platform landscape
  • Attack vectors in mobile platforms
  • Android OS architecture
  • iOS architecture
  • Jailbreaking/Rooting mobile devices
  • Mobile application repackaging
  • Mobile device management227
  • Mobile spyware and privacy concerns
  • Security guidelines for mobile devices and platforms
  • Test Your Understanding

Hacking Cloud, IoT, and OT Platforms

  • Introduction
  • Structure
  • Objectives
  • Cloud Computing
  • Cloud Infrastructure
  • Cloud Deployment Models
  • Virtualization
  • Containers
  • NIST Cloud Computing Reference
  • Architecture
  • Cloud computing threats
  • Cloud attack vectors
  • Internet of Things (IoT)
  • IoT Architecture
  • IoT communication models
  • Threats to IoT Networks
  • IoT attack vectors
  • Operational Technologies (OT) and
  • Industrial Internet of Things (IIoT)
  • OT and IIoT attack vectors
  • Cloud, IoT, and OT hacking tools
  • Conclusion
  • Test Your Understanding

Cryptography

  • Introduction
  • Structure
  • Objectives
  • Cryptographic primitives
  • Cryptanalysis tools

Evading Security Measures

  • Introduction
  • Structure
  • Objectives
  • Security of an information system
  • Threat Modelling
  • Intrusion Detection System (IDS)
  • Intrusion Prevention System (IPS)
  • Evading security measures
  • Detection by Association
  • Conclusion
  • Test Your Understanding

Practical Exercises on Penetration Testing and Malware Attacks

  • Structure
  • Objectives
  • Exercises
  • Solutions

Roadmap for a Security Professional

  • Introduction
  • Structure
  • Objectives
  • Cybersecurity Landscape
  • Network Security
  • Cyber Forensics
  • Penetration Testing
  • Cyber Auditing
  • Software Professional

Digital Compliances and Cyber Laws

  • Introduction
  • Structure
  • Objectives
  • Need for Compliances and Cyber Laws
  • The privacy debate
  • Activity

Ab Job Pakki!!
Kickstart your career