Spring 2023
10 Weeks
Book your seat
– Basic Terminologies
– Current Security Issues and requirement for testing
– Hacking Concepts
– Penetration Testing
– Difference between Ethical Hacking and Penetration Testing
– Hacking Phases
– Security and Defense in Depth
– Overview of Security and Controls
– Vulnerability Assessment
– Laws for Ethical hacking and Penetration Testing
– Scope of Penetration Testing
– Documentation techniques for penetration testing
– Understanding reconnaissance and footprinting
– Understanding different techniques for NetBIOS Enumeration
– Understanding different techniques for SNMP enumeration
– Understanding different techniques for LDAP enumeration
– Footprinting using whois
– Footprinting using search engine
– Introduction to Shodan
– Footprinting using Shodan
– Footprinting using GHDB
– Email footprinting
– Website footprinting
– Network footprinting
– DNS footprinting
– Introduction to social engineering
– Whois
– Shodan.io
– Whois.domaintools.com
– didtheyreadit
– haveibeenpwned
– nslookup
– recon-ng
– pOf
– Google Dork
– Google hacking database
– Netdiscover
– Angry IP scanner
– The harvester
– Hunter.io
– Scanning Concept
– Techniques to see Online systems
– Port Scanning
– Nmap Script Engine (NSE)
– IDS and Firewall Evasion Techniques
– Understanding Network Posture
– Changing Mac Address
– Spoofing
– Masscan
– Nmap
– Zenmap
– Macchanger
– Vulnerability of the management life cycle
– Vulnerability analysis with automated tools.
– Vulnerability Score
– Nessus
– OpenVas
– Nmap
– OWASP-ZAP
– Nikto
– Malware and its types
– Malware detection mechanism
– Introduction to Virustotal
– Ways to make malware undetected
– Virustotal
– No-distribute
– Understanding Metasploit framework
– Using auxiliaries
– Using payload
– Using Exploits
– Importing public exploits
– Privilege Escalation techniques
– Creating payloads/malware
– Metasploit
– Armitage
– Exploit-db
– Understanding Man in the middle concept
– Understanding Sniffing
– Understanding MAC Attack and MAC Spoofing
– Understanding ARP Poisioning
– Understanding DNS Poisoning
– Wireshak
– Network Miner
– Bettercap
– Macchanger
– Wireless encryption algorithm
– Wireless handshake capturing
– Cracking
– Capturing handshake in virtual environment
– Aircrack-ng
– Bettercap
– Hashcat
-Crackstation.net
– Understanding DOS Attack
– Understanding DDOS Attack
– Understanding Botnet
– LOIC (Low Orbit ION Cannon)
– HULK
– Understanding session hijacking
– Wireshark
– Understanding web server working and attack methodology
– Metsploit
– Nmap
– Nikto
– Dirbuster
– Gobuster
– Understanding web application vulnerabilities
– Web Application vulnerability exploitation
– Web application hacking/testing using Burpsuite
– Application level session hijacking
– Burpsuite
– SQLmap
– XSSER
– OWASP-ZAP
– Nikto
– Dirbuster
– Gobuster
– Understanding mobile hacking (Android)
– Metasploit
– FatRat
– L3mon
– IOT concepts
– IOT hacking using sessions grabbing
– Metsploit
– Nmap
– Understanding cloud computing
– Understanding cloud computing threats and attacks
– Understanding Cryptography
– Understanding Symmetric and Asymmetric Encryption techniques
– Understanding Email Security and testing
– Making a professional penetration testing report
WhatsApp us