Training

In Pune

₹ 12,000 VAT incl.

Description

  • Type

    Training

  • Level

    Beginner

  • Location

    Pune

  • Class hours

    2h

  • Duration

    45 Days

  • Start date

    Different dates available

  • Internship

    Yes

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

Facilities

Location

Start date

Pune (Mahārāshtra)
See map
SevenMentor Training 21/A,1st floor,Shreenath Plaza,Dnyaneshwar Paduka Chowk,FC Road,Shivajinagar,Pune, 411 004
Timetable: Monday to Friday 2pm-4pm

Start date

Different dates availableEnrolment now open

About this course

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Basic grammer
  • Basic Internet

Teachers and trainers (1)

Nisha Mandot

Nisha Mandot

Networking Trainer

Course programme


Introduction to Ethical Hacking
Footprinting, Scanning, and Enumeration
Hacking Web servers and Web applications
DoS, SQL injection, Buffer overflow attacks
Cryptography
Wireless hacking
Linux Hacking
Phishing
Countermeasures
Information Intelligence.
Organize Your Information
Google/Bing Hacking.
Hunting And Profiling People.
Gathering Email Accounts Sub domains/host.
Whois Lookup.
OS Info Hunting.
Uptime Info Hunting.
Webserver Info Hunting.
Traceroute Target IP Address.
TCP Port Scanning.
TCP SYN Port Scanning.
TCP ACK Firewall Scanning.
Finding Live Hosts.
UDP Sweeping And Probing.
Database Enumerating.
MySQL Server Enumerating.
DNS Enumerating.
SNMP Enumerating.
Password Attacks.
Advanced Web Server Fingerprinting.
Advanced Web Application Fingerprinting.
Advanced Web Application Firewall Fingerprinting.
Advanced OS Fingerprinting.
Attacking DHCP Servers.
Writing Virus Codes.
Writing Advance Backdoors for Windows.
Attacking Network Switches.
Attacking FTP Servers.
Advanced Social Engineering Attacks.
Advanced Cross Site Scripting attacks.
From Reflected XSS To Reverse Shell.
From Stored XSS To Reverse Shell.
Advanced File Handling Attacks.
From File Upload To Reverse Shell.
From Remote File Inclusion To Reverse Shell.
From Local File Inclusion To Reverse Shell.
From SQL Injection To Reverse Shell.
Advanced CSRF Attacks.
Session Hijacking Attacks.
What is a CAM Table.
What is a Botnet.
Advanced System Command Injection Attack.
Sniffing Network Passwords.
Sniffing HTTP Passwords.
Sniffing Ftp And Telnet Passwords.
Active sniffing.
Passive Sniffing.
Advanced Sniffing.
Sniffing Facebook Cookies.
Advanced SSL Sniffing.
Advanced Network Attacks.
From Man In The Middle Attack To Full Network.
Advanced Mobile Hacking Tactics.
Cryptography attacks
Attacking WEP Protected 802.11 Networks.
Attacking WPA/WPA2 Protected 802.11 Networks.
Attacking Apache Web Server.
Attacking IIS Web Server.
Buffer Overflow Attacks.
Advanced Stateful Packet Inspection Firewall Evasion And Bypassing.
Advanced Antivirus Detection Evasion And Bypassing.
Advanced Firewall Outbound/Inbound Rules Evasion And Bypassing.
Advanced Windows User Access Control (UAC) Evasion And Bypassing.
Vulnerability Vs Penteration Testing.
Anti-Virus.
Anti-Worm.
Anti-Trojan.
Anti-Rootkit.
Introduction to CCNA Security

Ethical Hacking

₹ 12,000 VAT incl.