Ethical Hacking

by Web Ludhiana Claim Listing

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Web Ludhiana Logo

img Duration

Please Enquire

Course Details

Ethical Hacking course is offered by Web Ludhiana. All our Ethical Hacking Training programs are based on Live Case studies and Industry Oriented Projects. Our training curriculum is approved by our Data Scientists and placement partners.

 

Course Content:

  • 1: Introduction to Information Security
  • What is Information Security
  • The misconception of the term Hackers and System
  • Sun Tzu’s definitions and Workings
  • Principle of Hacking
  • Working of Security Triangle
  • Biggest Threat – Security, Why?
  • Elements of Security
  • Terminologies of the Security
  • Classes of Hackers
  • Types of Attacks
  • Steps followed for hacking into the system
  • Important Websites to follow
  • CHAPTER 2: Networking and its Principles and it’s security
  • 1. Working on Network Technologies (Using Packet Tracer)
  • Introduction to Networks (basics)
  • Difference between OSI and TCP model
  • IP addressing in depth
  • Demo of Three Way Handshaking
  • What is an IP?
  • Types of Address
  • Public IP address
  • Private IP address
  • Demos of Public and Private IP address
  • Calculation of subnets/Subnet Mask
  • Usage of Switches/ Routers/Hubs in practical scenarios
  • Building up of Network Topologies
  • Collisions and Broadcast Domains
  • 2. Routers in Depth (Demos in Packet Tracer)
  • What are Routers??
  • Routing in details
  • Tools for networking
  • Static and Dynamic Routing
  • OSPF (open shortest path first)
  • RIP (Routing Information Protocol)
  • EIGRP (Enhanced Interior Gateway Routing Protocol)
  • 3. Switches in depth (Demos in packet tracer)
  • Working of a Switch
  • LAN Switching
  • CSMA/CD
  • VLANs (in depth)
  • Introduction to VLAN’s
  • Access Ports and Trunk Ports
  • Configuring VLAN’s in Packet Tracer
  • Native VLANs
  • Inter-VLAN Routing
  • Switch Security
  • Port Security
  • VTP (Virtual LAN Trunk Protocol)
  • Working of VTP
  • VTP Modes
  • Configuring of VTP
  • STP (Spanning Tree Protocol)
  • Working of STP
  • Introduction Configuring of STP
  • NAT (Network Address Translations)
  • What is NAT?
  • Real-time Scenarios of using NAT
  • Types of NAT
  • Configuring of Static NAT
  • DHCP (Dynamic Host Configuration Protocol)
  • Introduction to DHCP
  • Configuring of DHCP
  • 4. Portstion to Ports
  • Working of Ports
  • Types of Interfaces and ports
  • Scanning of Ports (using Nmap and Nessus)
  • Demo of Services running on ports
  • CHAPTER 3: Concept of Virtualization
  • Introduction to Virtualization
  • Working on the real-time scenarios
  • Working on the virtual machines
  • Creation of a virtual network of different OS
  • Creation of the client and server architecture on virtual machines
  • CHAPTER 4: Operating System Based Attacks
  • Introduction to the Operating System
  • Working of the Firmware
  • Complete working of the Booting Process
  • Importance of the Boot Loaders in OS hackings
  • Difference between Linux and Windows
  • Windows
  • Introduction to Windows
  • Installation of different flavors of Windows
  • Introduction to the hash functions
  • Hash functions securing the Windows
  • Getting into the hash functions to compromise windows
  • Introduction to System Administrations and its breaking
  • Exploitation (Real-time Working Exploits)
  • Basics of the Exploitation of real-time exploits
  • Confirming the attack exploitation
  • Configuring of the real-time test beds exploitation
  • Confusing Payloads and making choice of real-time attacking payloads
  • Demonstration of GUI and CLI payload working exploits
  • In-depth working of the “meterpreter” payload
  • Working of the Armitage – GUI exploitation of windows
  • Organizing the MSF panels
  • Introduction to the Post Exploitations
  • Demonstration of the Kung-Fu Exploitations
  • Complete Privilege Escalations of the Operating Systems
  • Dismantling the Anti-viruses
  • Disabling the Firewalls
  • Working on the Backdoors for the Post Exploitation
  • Getting into the Stealing of the Tokens
  • Working on the Priv and Sniffer Extensions
  • Introduction to the Port Forwarding and its demonstration
  • Adding of the functions and the DLL files to the windows and it’s exploitation
  • Demonstrations of the client-side working exploits
  • Introduction to the rootkits and their exploitation
  • Entering hands into the plugins support to the msf
  • Working on the API’s of the msf
  • Migrating the clone to the scripting under meterpreter
  • CHAPTER 5: Web Security and It’s Exploitation
  • 1. Introduction to Web Applications
  • Overview of the Penetration Testing and it’s types
  • Overview of the Web from the penetration tester’s view
  • Difference between the Websites/Web Apps/Web-Servers
  • Confusion of what to hack??
  • Exploring the server-client architecture
  • The building of the test-beds for pentesting
  • 2. Exploring the Vulnerabilities
  • Working of the complete session state works of the web
  • Exploring and Gathering the different types of vulnerabilities (in RAW)
  • Methods to focus only on the vulnerability
  • Exploring the URL and the build part of the SSL layer and It’s a weakness.
  • Crawling into the pool of Spidering the websites
  • Working of the Browsers, HTTP based Protocols and their Request Methods
  • The Exploitation phases and it’s complete following path algorithms
  • Types of Web-Apps attacks
  • 3. Fundamentals of HTTP and HTTPS
  • And more.
  • Ludhiana Branch

    55, New Sarabha Nagar, Pakhowal Road, Ludhiana

Check out more CEH (Certified Ethical Hacker) courses in India

Studide Logo

Ethical Hacking Course

Become Ethical Hacker – Ethical Hacking Course in Ranchi From Studide, we offer the best courses for security penetration testing and ethical hacking. We are the best option for Hacking Training and keep the students up to date with latest hacking techniques.

by Studide [Claim Listing ]
Cmsiclass Logo

CEH (V11)

CEH(V11) – IT Cloud Admin course is offered by Cmsiclass for all skill level. Cmsiclass Training Institute is a pioneer IT training institute of Coimbatore which offers quality computer education at academic and professional level.

by Cmsiclass [Claim Listing ]
Rooman Logo

Certified Ethical Hacker

The Certified Ethical Hacker (CEH) course is designed to equip individuals with the skills and knowledge needed to assess the security posture of computer systems and networks ethically.

by Rooman [Claim Listing ]
Samyak Classes Logo

Certified Ethical Hacking Training Course

Data Security is getting to be basic day by day. With appearance of more brilliantly innovations are instruments, number and sorts of dangers are expanding at uncommon pace. The troublesome innovations like cloud, Web of Things(IoT) are making more entryways for programmers and challenges are mount...

by Samyak Classes [Claim Listing ]
Edureka Learning Centre Logo

Cybersecurity And Ethical Hacking Classroom Training

Anyone who is interested in kickstarter Anyone interested in learning cyber security and ethical hacking and want to kick start their career in the cyber security and ethical hacking field can join the program.

by Edureka Learning Centre [Claim Listing ]
  • Price
  • Start Date
  • Duration

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy