Ethical Hacking

by Web Ludhiana Claim Listing

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Web Ludhiana Logo

img Duration

Please Enquire

Course Details

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

 

Course Content:

  • 1: Introduction to Information Security
  • What is Information Security
  • The misconception of the term Hackers and System
  • Sun Tzu’s definitions and Workings
  • Principle of Hacking
  • Working of Security Triangle
  • Biggest Threat – Security, Why?
  • Elements of Security
  • Terminologies of the Security
  • Classes of Hackers
  • Types of Attacks
  • Steps followed for hacking into the system
  • Important Websites to follow
  • CHAPTER 2: Networking and its Principles and it’s security
  • 1. Working on Network Technologies (Using Packet Tracer)
  • Introduction to Networks (basics)
  • Difference between OSI and TCP model
  • IP addressing in depth
  • Demo of Three Way Handshaking
  • What is an IP?
  • Types of Address
  • Public IP address
  • Private IP address
  • Demos of Public and Private IP address
  • Calculation of subnets/Subnet Mask
  • Usage of Switches/ Routers/Hubs in practical scenarios
  • Building up of Network Topologies
  • Collisions and Broadcast Domains
  • 2. Routers in Depth (Demos in Packet Tracer)
  • What are Routers??
  • Routing in details
  • Tools for networking
  • Static and Dynamic Routing
  • OSPF (open shortest path first)
  • RIP (Routing Information Protocol)
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • 3. Switches in depth (Demos in packet tracer)
  • Working of a Switch
  • LAN Switching
  • CSMA/CD
  • VLANs (in depth)
  • Introduction to VLAN’s
  • Access Ports and Trunk Ports
  • Configuring VLAN’s in Packet Tracer
  • Native VLANs
  • Inter-VLAN Routing
  • Switch Security
  • Port Security
  • VTP (Virtual LAN Trunk Protocol)
  • Working of VTP
  • VTP Modes
  • Configuring of VTP
  • STP (Spanning Tree Protocol)
  • Working of STP
  • Introduction Configuring of STP
  • NAT (Network Address Translations)
  • What is NAT?
  • Real-time Scenarios of using NAT
  • Types of NAT
  • Configuring of Static NAT
  • DHCP (Dynamic Host Configuration Protocol)
  • Introduction to DHCP
  • Configuring of DHCP
  • 4. Portstion to Ports
  • Working of Ports
  • Types of Interfaces and ports
  • Scanning of Ports (using Nmap and Nessus)
  • Demo of Services running on ports
  • CHAPTER 3: Concept of Virtualization
  • Introduction to Virtualization
  • Working on the real-time scenarios
  • Working on the virtual machines
  • Creation of a virtual network of different OS
  • Creation of the client and server architecture on virtual machines
  • CHAPTER 4: Operating System Based Attacks
  • Introduction to the Operating System
  • Working of the Firmware
  • Complete working of the Booting Process
  • Importance of the Boot Loaders in OS hackings
  • Difference between Linux and Windows
  • Windows
  • Introduction to Windows
  • Installation of different flavors of Windows
  • Introduction to the hash functions
  • Hash functions securing the Windows
  • Getting into the hash functions to compromise windows
  • Introduction to System Administrations and its breaking
  • Exploitation (Real-time Working Exploits)
  • Basics of the Exploitation of real-time exploits
  • Confirming the attack exploitation
  • Configuring of the real-time test beds exploitation
  • Confusing Payloads and making choice of real-time attacking payloads
  • Demonstration of GUI and CLI payload working exploits
  • In-depth working of the “meterpreter” payload
  • Working of the Armitage – GUI exploitation of windows
  • Organizing the MSF panels
  • Introduction to the Post Exploitations
  • Demonstration of the Kung-Fu Exploitations
  • Complete Privilege Escalations of the Operating Systems
  • Dismantling the Anti-viruses
  • Disabling the Firewalls
  • Working on the Backdoors for the Post Exploitation
  • Getting into the Stealing of the Tokens
  • Working on the Priv and Sniffer Extensions
  • Introduction to the Port Forwarding and its demonstration
  • Adding of the functions and the DLL files to the windows and it’s exploitation
  • Demonstrations of the client-side working exploits
  • Introduction to the rootkits and their exploitation
  • Entering hands into the plugins support to the msf
  • Working on the API’s of the msf
  • Migrating the clone to the scripting under meterpreter
  • CHAPTER 5: Web Security and It’s Exploitation
  • 1. Introduction to Web Applications
  • Overview of the Penetration Testing and it’s types
  • Overview of the Web from the penetration tester’s view
  • Difference between the Websites/Web Apps/Web-Servers
  • Confusion of what to hack??
  • Exploring the server-client architecture
  • The building of the test-beds for pentesting
  • 2. Exploring the Vulnerabilities
  • Working of the complete session state works of the web
  • Exploring and Gathering the different types of vulnerabilities (in RAW)
  • Methods to focus only on the vulnerability
  • Exploring the URL and the build part of the SSL layer and It’s a weakness.
  • Crawling into the pool of Spidering the websites
  • Working of the Browsers, HTTP based Protocols and their Request Methods
  • The Exploitation phases and it’s complete following path algorithms
  • Types of Web-Apps attacks
  • 3. Fundamentals of HTTP and HTTPS
  • And more.
  • Ludhiana Branch

    55, New Sarabha Nagar, Pakhowal Road, Ludhiana

Check out more CEH (Certified Ethical Hacker) courses in India

Indian Institute of Cyber Security Logo

(Certified Ethical Hacker) Course

CEH training in Bangalore with practical certification course from EC council. Best CEH training institute in Bangalore with hands on practical LIVE classes on Kali Linux, Metasploit.

by Indian Institute of Cyber Security [Claim Listing ]
Blitz Academy Logo

Certified Ethical Hacker (CEH) - EC-Council

Embarking on an Ethical Hacking course in Kerala is an excellent starting point for a career in Cyber Security. However, prior knowledge is beneficial; it is recommended to have a minimum of 2 years of IT Security experience before attempting the course.

by Blitz Academy [Claim Listing ]
SSW Research & Development Logo

CEH

Understand application security at a deeper level Learn Basic to expert level of web hacking (learn..! Earn..!) Set Up their own testing environment for practicing hacking safely.

by SSW Research & Development [Claim Listing ]
Insys Technologies Logo

Ethical Hacking

Ethical hackers learn and perform hacking in a professional manner, based on the direction of the client, and later, present a maturity scorecard highlighting their overall risk and vulnerabilities and suggestions to improve.

by Insys Technologies [Claim Listing ]
Edge Educations Logo

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) course is offered by Edge Educations. Edge Educations Organizes qualifications according to a series of levels of knowledge, skill, and aptitude. We are Education, create your passion and inspiration. And hope success will come for your dream.

by Edge Educations [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy