Ethical Hacking

by Web Ludhiana Claim Listing

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Web Ludhiana Logo

img Duration

Please Enquire

Course Details

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

 

Course Content:

  • 1: Introduction to Information Security
  • What is Information Security
  • The misconception of the term Hackers and System
  • Sun Tzu’s definitions and Workings
  • Principle of Hacking
  • Working of Security Triangle
  • Biggest Threat – Security, Why?
  • Elements of Security
  • Terminologies of the Security
  • Classes of Hackers
  • Types of Attacks
  • Steps followed for hacking into the system
  • Important Websites to follow
  • CHAPTER 2: Networking and its Principles and it’s security
  • 1. Working on Network Technologies (Using Packet Tracer)
  • Introduction to Networks (basics)
  • Difference between OSI and TCP model
  • IP addressing in depth
  • Demo of Three Way Handshaking
  • What is an IP?
  • Types of Address
  • Public IP address
  • Private IP address
  • Demos of Public and Private IP address
  • Calculation of subnets/Subnet Mask
  • Usage of Switches/ Routers/Hubs in practical scenarios
  • Building up of Network Topologies
  • Collisions and Broadcast Domains
  • 2. Routers in Depth (Demos in Packet Tracer)
  • What are Routers??
  • Routing in details
  • Tools for networking
  • Static and Dynamic Routing
  • OSPF (open shortest path first)
  • RIP (Routing Information Protocol)
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • 3. Switches in depth (Demos in packet tracer)
  • Working of a Switch
  • LAN Switching
  • CSMA/CD
  • VLANs (in depth)
  • Introduction to VLAN’s
  • Access Ports and Trunk Ports
  • Configuring VLAN’s in Packet Tracer
  • Native VLANs
  • Inter-VLAN Routing
  • Switch Security
  • Port Security
  • VTP (Virtual LAN Trunk Protocol)
  • Working of VTP
  • VTP Modes
  • Configuring of VTP
  • STP (Spanning Tree Protocol)
  • Working of STP
  • Introduction Configuring of STP
  • NAT (Network Address Translations)
  • What is NAT?
  • Real-time Scenarios of using NAT
  • Types of NAT
  • Configuring of Static NAT
  • DHCP (Dynamic Host Configuration Protocol)
  • Introduction to DHCP
  • Configuring of DHCP
  • 4. Portstion to Ports
  • Working of Ports
  • Types of Interfaces and ports
  • Scanning of Ports (using Nmap and Nessus)
  • Demo of Services running on ports
  • CHAPTER 3: Concept of Virtualization
  • Introduction to Virtualization
  • Working on the real-time scenarios
  • Working on the virtual machines
  • Creation of a virtual network of different OS
  • Creation of the client and server architecture on virtual machines
  • CHAPTER 4: Operating System Based Attacks
  • Introduction to the Operating System
  • Working of the Firmware
  • Complete working of the Booting Process
  • Importance of the Boot Loaders in OS hackings
  • Difference between Linux and Windows
  • Windows
  • Introduction to Windows
  • Installation of different flavors of Windows
  • Introduction to the hash functions
  • Hash functions securing the Windows
  • Getting into the hash functions to compromise windows
  • Introduction to System Administrations and its breaking
  • Exploitation (Real-time Working Exploits)
  • Basics of the Exploitation of real-time exploits
  • Confirming the attack exploitation
  • Configuring of the real-time test beds exploitation
  • Confusing Payloads and making choice of real-time attacking payloads
  • Demonstration of GUI and CLI payload working exploits
  • In-depth working of the “meterpreter” payload
  • Working of the Armitage – GUI exploitation of windows
  • Organizing the MSF panels
  • Introduction to the Post Exploitations
  • Demonstration of the Kung-Fu Exploitations
  • Complete Privilege Escalations of the Operating Systems
  • Dismantling the Anti-viruses
  • Disabling the Firewalls
  • Working on the Backdoors for the Post Exploitation
  • Getting into the Stealing of the Tokens
  • Working on the Priv and Sniffer Extensions
  • Introduction to the Port Forwarding and its demonstration
  • Adding of the functions and the DLL files to the windows and it’s exploitation
  • Demonstrations of the client-side working exploits
  • Introduction to the rootkits and their exploitation
  • Entering hands into the plugins support to the msf
  • Working on the API’s of the msf
  • Migrating the clone to the scripting under meterpreter
  • CHAPTER 5: Web Security and It’s Exploitation
  • 1. Introduction to Web Applications
  • Overview of the Penetration Testing and it’s types
  • Overview of the Web from the penetration tester’s view
  • Difference between the Websites/Web Apps/Web-Servers
  • Confusion of what to hack??
  • Exploring the server-client architecture
  • The building of the test-beds for pentesting
  • 2. Exploring the Vulnerabilities
  • Working of the complete session state works of the web
  • Exploring and Gathering the different types of vulnerabilities (in RAW)
  • Methods to focus only on the vulnerability
  • Exploring the URL and the build part of the SSL layer and It’s a weakness.
  • Crawling into the pool of Spidering the websites
  • Working of the Browsers, HTTP based Protocols and their Request Methods
  • The Exploitation phases and it’s complete following path algorithms
  • Types of Web-Apps attacks
  • 3. Fundamentals of HTTP and HTTPS
  • And more.
  • Ludhiana Branch

    55, New Sarabha Nagar, Pakhowal Road, Ludhiana

Check out more CEH (Certified Ethical Hacker) courses in India

Ultimate Institute Of Technologies Logo

Certified Ethical Hacker

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course on the globe to help information security professionals grasp the fundamentals of ethical hacking.

by Ultimate Institute Of Technologies [Claim Listing ]
Radical Technologies Logo

Ethical Hacking Training

Ethical Hacking course is offered by Radical Technologies for all skill levels. Radical Technologies is a recognized leader in training of Administrative and Software Development courses since 1995 to empower IT individuals with competitive advantage of exploiting untapped jobs in IT sector.

by Radical Technologies [Claim Listing ]
Clado Logo

Ethical Hacking

This course gives you the scoop into what are the foundations, processes, and outcomes from Ethical Hacking and common attacks that demand this skill to be acquired.

by Clado [Claim Listing ]
Vidya Training And Development Center Logo

Ethical Hacking

Ethical Hacking course is offered by Vidya Training And Development Center. Our training partnerships allow us to leverage direct access to official and continually updated training materials, lab facilities and periodic faculty development programs.

by Vidya Training And Development Center [Claim Listing ]
MIS Infotech Logo

Ethical Hacking (CEH V10)

The Certified Ethical Hacker Training is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one!

by MIS Infotech [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy