My Cart 0

Ethical Hacking Course – Summer Training in Bijnor







What is Ethical Hacking?

Nowadays,  Cyber crime is increasing day by day, the number of cyber victim is raising and its all happens by Hacking. Hacking is a process to getting someones password (WiFi, Facebook, instagram, gmail, computer) for accessing data unauthorized way. Ethical Hacking is same process but it is used for legal Purpose for example helping Government Cyber Cell for solving cyber cases, Pvt. Agency, Helping Companies for getting protect from hackers.

After completing this course, You will know following major hacker's tactics:

  1. Crack wifi password.
  2. Jam Any WiFi Network for desired time.
  3. Crack Windows & Linux passwords.
  4. 10 Ways for cracking password of social sites ( Facebook, Gmail, Instagram, Twitter etc. )
  5. Bounce your Location like a professional hackers.
  6. Bypass login Screen. 
  7. Hacking into system and  control over system. 

Why Ethical Hacking?

Government agencies and business organizations today are in constant need of ethical hackers to combat the growing threat to IT security, says Jay Bavisi, co-founder of the EC Council.

  • Start your career in Industry required Technology.
  • Get familiar new type of cyber attacks and protection. 
  • Understanding how hackers steal money from bank accounts.
  • Help government and pvt agencies to solve cyber cases / getting protect from hacking.
  • Earn Money from home by bug hunting and Freelance projects. Google giving $200,000 for hunting bug

Course Highlights

Course Name :            Ethical Hacking - Summer Training Course 

Course Duration :     45 Days (90 Hours )

Certification :             Certificate of Completion by Cyber Pratibha

Study Material :         E-book, LAB Manual & Reference Guide

Software Kit :              All Required tools inside DVD

Demonstration  :        2 Live demonstration attack by students (Any attack what they have learnt)

Ethical Hacking - Course Content

Ethical Hacking – Course Content

  • Ethical hacking Overview
  • Types of Hacking and Hacker
  • Phase of Ethical hacking
  • Setup Practical platform (LAB ) for Penetration Testing
  • Install, Upgrade, Update and basic Utility of Kali Linux
  • Booting up Kali Linux (Live and Persistent Live)
  • Tools grouping
  • Find, Locate and Which
  • More, info and man  
  • Working with file, Directory.
  • Manage Users and Passwords
  • Kali linux useful services
  • Basic introduction about bash environment
  • Netcat
    1. Connecting  to  a  TCP/UDP  Port  
    2. Listening  on  a  TCP/UDP  Port  
    3. Transferring  Files  with  Netcat  
    4. Remote  Administration  with  Netcat  
  • Ncat (21st Century netcat)
  • Wireshark
    1. Basics
    2. Making sense of dump networks traffic
    3. Capture and display filter
    4. Following TCP streams
  • TCP Dump/ T-shark
  • Gather Information about Peoples using Social Sites
  • Gather Information by using Search engine Google
  • Google Hacking and GHDB
  • Use Maltego for information Gathering Tool
  • Email Harvesting
  • Whois
  • Recon-ng
  • DNS Enumeration and Zone Transfer
  • Dnsenum, dig, host
  • SMB Enumeration
  • SMTP Enumeration
  • SNMP Enumeration
  • Port Scanning
    1. Introduction
    2. Detecting Live Host
    3. Ping Scaning
    4. Ping Sweep Scanning
    5. Tools
    6. Ping
    7. Fping
    8. Detecting Open Ports
    9. Mechanism of Stablish Connection
    10. Analyzing Packets of three way Handshake
    11. TCP/IP Communication Flags
    12. Nmap Scanning Tool
    13. Familiar with Zenmap Scannning tools
    14. Types of  Port Scanning
    15. Firewall/IDS evasion Technique
    16. Detecting Active Service
  • Scanning Tools
    1. Zenmap
    2. Nmap
    3. Amap
    4. Unicornscan
    5. P0f
    6. Angree IP Scanner
  • Nmap
  • Open VAS
  • Nessus
  • Introduction of Vulnerability Assessment
  • Installing/Configure Nessus
  • Windows System Security and Attack
  • LM & NT Hashes, SAM and bootkey
  • Bypass Administrator Password
  • Access Windows Password by using Back door
  • Net user command
  • Stealing (Dump) Hashes – Local Computer (offline)
  • Password Cracking Tool John The Ripper
  • Booting process of Linux
  • Roll of the Password to Access the control
  • Editing grub boot loader file
  • Crack Linux password by single User mode
  • Protect Grub bootloader
  • Remove Grub bootloader password – Local System
  • Dump and Cracking Linux password hashes using John The Ripper
  • Description of Cryptography
  • Classification of Cryptography
  • Hashes and Its function
  • SSH (Secure Shell)
  • Encrypt files and folders with EFS.
  • Encrypt Drive partition and Pendrive and make it password protected
  • Encrypt complete hard disk with System partition - Veracrypt
  • Overview of Steganography
  • Data streaming in NTFS Windows files system
  • Hide EXE file (Virus) in Text file/Mp3/Video Files
  • Top 10 tools for Steganography
  • Privilege Escalation Exploits
  • Local Privilege Escalation Exploit in Linux Example
  • Local Privilege Escalation Exploit in Windows Example
  • Network Essentiale
  • Types of Network & Topology
  • IP Address
  • Default Getway
  • DNS Server
  • MAC Adress
  • ARP Protocols, works and use
  • Protocols and Protocol Suite
  • OSI Model
  • Types of Sniffing
  • MAC Flooding
  • DHCP Starvation
  • ARP Poisoning
  • Man In The Middle Attack By using Ettercap
  • Wireshark
  • Preparing for Brute Force
    1. Dictionary Files
    2. Key-space Brute Force
    3. Pwdump and Fgdump
    4. Windows Credential Editor (WCE)
    5. Exercises
    6. Password Profiling
    7. Password Mutating
  • Online Password Attacks
  • Hydra, Medusa, and Ncrack
  • Exercises
  • Password Hash Attacks
    1. John the Ripper
    2. Rainbow Tables
    3. Passing the Hash in Windows
    4. Exercises
  • Proxy
  • HTTP Proxy
  • Socks Proxy
  • VPN
  • IDS & IPS
  • Firewall
  • Honeypot
  • Introduction of Metasploit
  • Differnce Interfaces of Metasploit
  • Hack SSH Server by Misconfiguration of NFS Server
  • Exploit Services netbios-nss
  • rmi registary, distccd, druby
  • Encoding Payloads with Metasploit
  • Crypting Known Malware with Software Protector
  • Using Custom/Uncommon Tools and Payloads
  • Exercise
  • Expanding Influence
  • Client Side Attack Against Internal Network
  • Privilege Escalation Through AD Misconfigurations
  • Port Tunneling
  • Web Server Architecture
  • Setting up Virtual Lab for Web pen testing
  • Finding Vulnerability in Websites
  • Common Vulnerability
  • Introduction of XSS
  • Persistence & Non-persistent XSS
  • Exploit and Hook the Browser by XSS & BeEF
  • File inclusion local and Remotely
  • SQL Injection
  • Uploading Web shell by SQL Injection
  • Basic Practice of SQL Injection by sqlmap
  • Tempering DATA
  • Session Hijacking
  • File Inclusion
  • Set up Working LAB for Wireless hacking
  • Monitor Nearby Wireless Network (Access Point and Clients)
  • Capture network Data
  • Cracking WEP Encryption
  • Cracking WPA/WPA2 Password Cracking
  • Attack on WPS enabled wireless access point  
  • Deauthentication Attack (Jam desired wifi Network)
  • Man In the Middle Attack on Wireless

Pre Requisite for Ethical Hacking Course

Do you have? :             Basic Knowledge about Computer, Internet & Websites 

Do you Know?:           Basic understanding about Networking and Server


bring laptop with you 

It is strongly recommended to bring your own LAPTOP during the training so that you can easily practice the exercises at home.

For More information Get in Touch

error: Content is protected !!

Notice: Undefined offset: 1 in /home/cyrageco/ on line 827