Ethical Hacking

In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers. Throughout the course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security.

Course Objectives

After completing this course, students will be able to

  • Introduction to Ethical Hacking
  • Footprinting, Scanning, and Enumeration
  • Hacking Web servers and Web applications
  • DoS, SQL injection, Buffer overflow attacks
  • Cryptography
  • Wireless hacking
  • Linux Hacking
  • Phishing
  • Countermeasures

Target Audience

Course Pre-Requisites

  • An ethical hacker must have excellent computer networking and programming skills.
  • An ethical hacker must be cautious, vigilant, and diligent in seeking to search and wait for the required results.
  • An ethical hacker should always be wise enough to consider the scenario and certain users’ mindset, to utilize social engineering exploitations. A good ethical hacker still requires excellent problem-solving skills.
  • Ethical hackers do require street smarts, people’s talents, and also manipulation skills.
  • You need to keep up to date with new technologies, vulnerabilities, and exploitation techniques.

Course Duration

Fee15000/=
TypeOffline/Online
Module16
Duration48 Hours
Session16
Per Class3.00 Hours

Details Course Outlines

Module-01

Introduction to Ethical Hacking

Module-02

Foot Printing

Module-03

Scanning

Module-04

Hacking Web Servers & Web Application

Module-05

Session Hijacking

Module-06

SQL Injection

Module-07

Evading Firewalls, IDS & Honeypots

Module-08

Buffer OverFlow

Module-09

Denial of Service

Module-10

Cryptography

Module-11

System Hacking

Module-12

Sniffers

Module-13

Phishing

Module-14

Malware

Module-15

Kali Linux

Module-16

Wireless Hacking

Module-17

Penetration Testing

Module-18

Counter Measure Techniques for Network level attacks

Module-19

Counter Measure Techniques for Local Systems

Module-20

Counter Measure Techniques for Malware attacks