ETHICAL HACKING

Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated.

With the increasing use of the internet and concerns about its security, especially when it comes to things like consumer information or private details, there is considerable need for computer experts to work in ethical hacking field. Organizations today recognize the strong need for information security; hence an ethical hacker or security expert is usually employed by companies to penetrate into networks and/or computer systems, using the same methods as a hacker, for the purpose of finding and fixing network and computer security vulnerabilities.

    We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples -
  • Website Hacking - Hacking a website means taking unauthorized control over a web server and its associated software such as databases and other interfaces.
  • Network Hacking - Hacking a network means gathering information about a network by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
  • Email Hacking - It includes getting unauthorized access on an Email account and using it without taking the consent of its owner.
  • Password Hacking - This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  • Computer Hacking - This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
  • Chapter 1 -Introduction to Hacking
    • What is hacking
    • What are the types of hacker
    • What is VAPT
    • Introduction to OWASP
  • Chapter 2 -Networking
    • What is IP
    • Types of Ip
    • IPv4 & IPv6
    • Topology
    • Types of topology
  • Chapter 3- FootPrinting
    • What is Footprinting
    • Types of Footprinting
    • Steps of Footprinting
    • Practical OnFootprinting
    • Counter Measure
  • Chapter 4 - Scanning
    • What is scanning
    • Tools for scanning
    • OWASP zap
    • Namp
    • counter measure
  • Chapter 5 - Google Hacking
    • introduction to Google.
    • Google Dorks
    • Robots File
    • counter measure
  • Chapter 6 - Malware / Trojan
    • What is malware
    • Batch file virus
    • Creating trojan virus
    • Darkcomet
  • Chapter 7 – Metaspoilt
    • msfconsole
    • msfvenom
    • use of exploit
    • counter measure
  • Chapter 8 - Android Hacking & Security
    • creating backdoor
    • using Metasploit
    • creating malacious application
    • Exploiting Android
  • Chapter 9 - Denial of service
    • Tools
    • counter measure
  • Chapter 10 - Password Cracker
    • PDF password Brute Force
    • Password Viewer
    • Recovering Lost Password
    • Sniffers
  • Chapter 11 - Phishing / Social engineering
    • what is Phishing
    • Performing Phishing
    • Facebook hacking
    • social engineering
    • Counter measure
  • Chapter 12 - XSS Attack
    • Introduction
    • Types of XSS
    • Counter Measure
  • Chapter 13 - SQL Injection
    • What is SQL
    • Introduction to SQL Injection
    • Hacking Database
    • Finding Admin panel
    • Breaking admin panel
    • Counter Measure
  • Chapter 14 - E-mail Security
    • Introduction to Email security
    • How Email works
    • Hacking Mail clients
    • Fake mail
    • How to check Fake mail
    • Counter Measure
  • Chapter 15 - Cryptography & Stegnography
    • Introduction
    • Practical and tools
    • Counter Measure
  • Chapter 16 - WiFi Hacking
    • Wifi Types
    • Hacking WEP/WPA2
    • Tools to hack WiFi
    • Counter Measure
  • Chapter 17 - Cyber Forensics
    • Introduction
    • Data Recovery
    • website logs
  • Chapter 18 - Report writing & earning money
    • VAPT report
    • Bug Crowd
    • Hacker one
    • Google Ad sense
    • Affiliate marketing
DURATION:50HRs

GET GUIDANCE FROM EXPERT COUNSELORS


Get Guidance from Expert Counselors
close slider