Sale!
online live classes-ethical hacking
  • online live classes-ethical hacking

Ethical Hacking Live Classes

25,000.00 18,750.00

Product Name:              Ethical Hacking Course

Training Mode:             Online Live classes

Training Duration:      60 Hours (30 Days * 2 hrs/Day Hrs)

Trainer Name:               Vijay Kumar

 

 

Hourse

Category:

Description

Product Name:              Ethical Hacking Course

Training Mode:             Online Live classes

Training Duration:      60 Hours (30 Days * 2 hrs/Day Hrs)

Trainer Name:               Vijay Kumar

Course Content: 

Ethical Hacking Online Course

  • Overview of cybercrimes in India
  • Overview of Hacking and Hackers
  • Highly paid career in Ethical hacking
  • Overview and Importance of LAB Setup
  • Download and install Vitrualbox on Windows OS
  • Install Kali Linux on Virtualbox
  • Install metasploitable 2 Linux as Victim machine 1
  • Install Windows 10 on Virtual Box
  • Deep understanding about Virtual networking
  • Overview and Objective of Information Gathering
  • Information gathering by using search engine
  • Information gathering by using social sites
  • Information gathering about Website
  • Gather domain owner’s personal details Whois
  • Information gathering about DNS and MAIL server
  • Collecting emails and gather information from emails
  • Overview of Network Scanning
  • Scan Network for Live hosts
  • Scan hosts in Network for open ports
  • Different techniques are used against port scanning
  • Enumeration with nmap script engine
  • Detect service version and OS detail
  • Nmap – Scan result save in output file
  • Overview of Google Hacking:
  • Overview and use of Google Operators
  • Overview of Google Hacking Database:
  • Change windows OS password without current password
  • Change Windows Password By backdoor:
  • Bypass Windows Login screen:
  • Enable Syskey Password to protect User’s Account:
  • Dump Windows 10 password Hashes and crack it
  • Linux User and password management
  • Change Linux user password in Single User mode
  • Implement Chattr attribute and protect password files
  • Protect grub boot loader in Linux
  • Remove Grub boot loader password protection
  • Dump Linux hashes and crack it
  • Overview of Password cracking and Types
  • Creating dictionary by using crunch
  • Creating dictionary using cwel
  • Rule Based dictionary attack
  • Cracking online services by dictionary attack
  • Zip password cracking with brute force attack
  • Collect username and password using key logger
  • NTFS Data Stream in Action
  • Detect Alternate Data stream
  • Overview of Steganography
  • Steganograpy in Action quickstego
  • Steganograpy in Action – Omnihide
  • Overview of Encryption for protecting data
  • EFS in Action and Backup certificate
  • Circumstances of losing EFS data and Recovery
  • Bit locker and Bit locker go in Action
  • Overview and installation of Veracrypt
  • Veracrypt in action
  • Overview of Trojan
  • Trojan Infection and Evading Techniques
  • Trojan Detection techniques
    • Check open ports – cports
    • Check running processes processmonitor
    • Check for registry – jv 16 registry
    • Find untrusted drivers – driversview
    • startup monitor
    • Network activity netstat
    • tcpview for checking network activity
  • Countermeasure from Trojan
  • Overview and types of Honeypot
  • Honeypot KFsensor in action
  • Overview of Proxy server
  • Types of Proxy Server
  • Configure Proxy in Browsers
  • Bounce your IP like a Pro Hacker
  • Elite Proxy Checker
  • Basic understanding about network and devices
  • MAC flooding attack against switch in network
  • ARP spoofing attack in LAN
  • Detect Arp spoofing attack on Windows
  • MAC spoofing attack in windows and Linux
  • Sniffing get username and password from the network
  • DHCP starvation attack
  • Overview of Social Engineering
  • Types of Social Engineering
  • Human based Social Engineering
  • Computer based social engineering
  • Mobile based social engineering
  • Reality behind hacking of social sites:
  • Advance phishing attack against Facebook
  • Stealing saved password from browser
  • Hijack the session of facebook
  • Getting started with metasploit
  • Component of Metasploit
  • Know about open ports and vulnerability on Remote host
  • Authentication brute forcing against online services
  • Metasploit GUI Armitage
  • Armitage One more Step:
  • msfvenom create Trojan for windows
  • Client side attack Linux Trojan
  • Enable WEP in WiFi Router
  • Cracking Wirerless Encryption WEP
  • Enable WPA in WiFi Router
  • Cracking WiFi WPA WPA2 encryption