Ethical Hacking
Training
In Pune
Description
-
Type
Training
-
Level
Beginner
-
Location
Pune
-
Class hours
2h
-
Duration
45 Days
-
Start date
Different dates available
-
Internship
Yes
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.
Facilities
Location
Start date
Start date
About this course
This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.
Reviews
Subjects
- Basic grammer
- Basic Internet
Teachers and trainers (1)
Nisha Mandot
Networking Trainer
Course programme
Introduction to Ethical Hacking
Footprinting, Scanning, and Enumeration
Hacking Web servers and Web applications
DoS, SQL injection, Buffer overflow attacks
Cryptography
Wireless hacking
Linux Hacking
Phishing
Countermeasures
Information Intelligence.
Organize Your Information
Google/Bing Hacking.
Hunting And Profiling People.
Gathering Email Accounts Sub domains/host.
Whois Lookup.
OS Info Hunting.
Uptime Info Hunting.
Webserver Info Hunting.
Traceroute Target IP Address.
TCP Port Scanning.
TCP SYN Port Scanning.
TCP ACK Firewall Scanning.
Finding Live Hosts.
UDP Sweeping And Probing.
Database Enumerating.
MySQL Server Enumerating.
DNS Enumerating.
SNMP Enumerating.
Password Attacks.
Advanced Web Server Fingerprinting.
Advanced Web Application Fingerprinting.
Advanced Web Application Firewall Fingerprinting.
Advanced OS Fingerprinting.
Attacking DHCP Servers.
Writing Virus Codes.
Writing Advance Backdoors for Windows.
Attacking Network Switches.
Attacking FTP Servers.
Advanced Social Engineering Attacks.
Advanced Cross Site Scripting attacks.
From Reflected XSS To Reverse Shell.
From Stored XSS To Reverse Shell.
Advanced File Handling Attacks.
From File Upload To Reverse Shell.
From Remote File Inclusion To Reverse Shell.
From Local File Inclusion To Reverse Shell.
From SQL Injection To Reverse Shell.
Advanced CSRF Attacks.
Session Hijacking Attacks.
What is a CAM Table.
What is a Botnet.
Advanced System Command Injection Attack.
Sniffing Network Passwords.
Sniffing HTTP Passwords.
Sniffing Ftp And Telnet Passwords.
Active sniffing.
Passive Sniffing.
Advanced Sniffing.
Sniffing Facebook Cookies.
Advanced SSL Sniffing.
Advanced Network Attacks.
From Man In The Middle Attack To Full Network.
Advanced Mobile Hacking Tactics.
Cryptography attacks
Attacking WEP Protected 802.11 Networks.
Attacking WPA/WPA2 Protected 802.11 Networks.
Attacking Apache Web Server.
Attacking IIS Web Server.
Buffer Overflow Attacks.
Advanced Stateful Packet Inspection Firewall Evasion And Bypassing.
Advanced Antivirus Detection Evasion And Bypassing.
Advanced Firewall Outbound/Inbound Rules Evasion And Bypassing.
Advanced Windows User Access Control (UAC) Evasion And Bypassing.
Vulnerability Vs Penteration Testing.
Anti-Virus.
Anti-Worm.
Anti-Trojan.
Anti-Rootkit.
Introduction to CCNA Security
Ethical Hacking