Ethical Hacking Online Course in USA

Ethical Hacking & Information Security Course Overview

1.Introduction to Cyber Security

  • Overview of Cyber Security
  • Hackers Vs Ethical Hackers
  • Different Types Of Hackers
  • World Top Hacker’s History
  • Terminologies used in Hacking
  • Malicious hacker phases
  • Requirments To Become a Hacker

2. Careers In Cyber Security

  • Why is Cyber Security essential?
  • Different Fields in Cyber Security
  • Certifications and Importance
  • Short& Long Term courses Available
  • Need of Cyber Security Experts

3. The concept of Virtualization.

  • Taking Snapshot
  • Running Multiple Platforms.
  • Backend Settings Changing.

3.1 Kali Linux Terminology

  • Kali Linux Installation and Configuration
  • ISO Customizations
  • Different Desktop environments
  • Security and Package update

4. Information Gathering

  • What is Information Gathering
  • Active& Passive Information Gathering
  • Dnsdict6
  • Dnsenum
  • Dnsmap
  • Dnsrecon
  • Dnsrevenum6
  • Dnsrevenum6
  • Dnswalk
  • Fierce
  • Maltego
  • Nmap
  • Zenmap
  • Urlcrazy
  • Miranda
  • Knock
  • Knock

5. Google as an Information Gathering Agent

  • Google and Its Working
  • Dork For Google Hacking
  • inurl
  • intitle
  • filetype
  • site
  • cache
  • shtml
  • define
  • Info etc

6. Tools For Google Hacking

7. Web Crawling Tools

8. Web-based Footprinting

  • BlogPulse
  • Pipl
  • Spy

9. Sites For Footprinting

  • Netcraft
  • Yougetsignal
  • Spiderfoot
  • Dnsstuff
  • MxToolbox
  • Backstreet Browser

10. Basics of Networking Concepts

  • What is Network?
  • Types of Network
  • Network Topologies
  • Networking Devices
  • What are IP Addresses?
  • Types of IP Addresses.
  • What are MAC Addresses?
  • ISO/OSI Layers DEFINITION
  • Network configuration management

11. Scanning and Enumerations

  • Overview of TCP/IP 3 way Handshake
  • Stealth scans
  • Nmap scanning methods
  • NmapRealworld scans
  • Nmap Script Engine
  • Evading firewall/ IDS
  • Firewall scanning using HPING3
  • Online Scanning
  • Some useful scanners
  • Autoscan, Superscan, Unicornscan
  • Introduction to Enumeration
  • SNMP Enumeration
  • Banner grabbing

12. Hiding Identity

  • Online Proxy
  • Proxy Tools
  • Mac spoof
  • Tab, Browser, System, Network Based Proxy
  • VPNs
  • Bypass Restrictions Using Proxy and VPNs

13. Social Engineering Toolkit

  • What is Social Engineering
  • Types of Social Engineering
  • The spear-phishing attack vectors
  • The spear-phishing attack vectors
  • Infectious Media Generator
  • SMS Spoofing Attack Vector
  • QRcode Generator Attack Vector
  • How to Perform Social Engineering Attack
  • Prevention against Social Engineering

14. Advance Metasploit Exploitation

  • Metasploit Framework
  • Metasploit Interfaces
  • Payloads
  • Shellcode Database

15. Post Exploitation

  • Pivoting
  • Privilege Escalation

16. Sniffing

  • Wireshark
  • NetworkMiner
  • Cain and Abel
  • Ettercap

17. System Hacking

  • Password Cracking
  • Password Resetting
  • Login Without Entering Password
  • Password In Plain Text
  • Backdoor Installation
  • Securing System

18. Virus, Trojan, and Keyloggers

  • Hacking Using Trojans and Others Malware
  • Binding Trojans
  • Bypassing Anti viruses
  • Rootkits
  • Botnets

19. Data Hiding

  • Introduction to Stenography
  • Introduction to Cryptography
  • Data Hiding Behind Images, Videos Files Etc
  • Data Hiding Tools
  • Cryptography
  • Use of cryptography in Data Hiding
  • Hashing
  • Common Hash Algorithms
  • Generic Hash Demo
  • Security Issues in Hashing
  • SSL/TLS & Connection Setup

20. Wireless Hacking

  • WEP Cracking
  • WPA/WPA2 Password Cracking
  • WI-FI Router Password Cracking
  • Wireless Security Measures

21. Mobile Hacking

  • Call Spoofing
  • Fake SMS

22. Honeypots

  • IDS& IPS
  • Installation, Configuration & Maintenance
  • Honeypots
  • Types Of Honeypots
  • Implementation of Honeypots
  • Firewall Types
  • Packet Filtering Firewall Types
  • Proxy Firewalls Firewall Types
  • Circuit-Level Proxy Firewall
  • Stateful Multi inspection Firewall

23. Buffer Overflow, DOS, and DDOS

  • Buffer Overflows
  • Hping
  • Slowris
  • LOIC
  • More Dos concepts (dhcp ,mac flooding,dns spoof , telling about CIA triad loss)

24. Reverse Engineering

  • Introduction
  • Assembly Language basics
  • Identifying flaws
  • Debuggers
  • Bypassing and Cracking
  • Counter measures

25. Pentest Methodology

  • Description of different pen Testing Methodologies
  • Open Source Security Testing Methodology Manual (OSSTMM)
  • Information Systems Security Assessment Framework (ISSAF)
  • Open Web Application Security Project (OWASP) Top Ten
  • Web Application Security Consortium Threat Classification (WASC-TC)
  • PCI-DSS

26. Addons and Tool Based Footprinting

  • Hackbar
  • Tamper Data
  • DOM Inspector
  • HTTP Live Header
  • Fire Bug

27. Website Hacking

  • Bypass Authentication
  • Google as Vulnerability Scanner
  • Manual& Automatic SQL Injection
  • Sqlmap
  • Sqlninja
  • Sqli
  • Cross Site Scripting
  • Dumping Passwords
  • Countermeasures

28. VA-PT

  • Introduction to VA-PT
  • Key Benefits & Difference
  • Closed Source VA-PT
  • Open source VA-PT
  • Open source VA-PT
  • Manual VA-PT

29. Disaster Recovery

  • Introduction to Disaster Recovery and Business Continuity
  • Types of Disasters
  • Data disasters
  • Virus disasters
  • Software Disasters
  • IT Staff Member Disasters
  • Disaster Recovery at Home
  • Introduction to Non-IT Disasters

30. Computer Forensics

  • Introduction to Computer Forensics
  • Computer Crimes and Criminals
  • Collecting and Preserving Digital Evidence
  • Building a Cybercrime Case
  • Computer Hardware
  • Computer Software
  • Preserving and Recovering Digital Evidence

summer it training program

Click Here to Register