Ethical Hacking (CEH)

by Micireds Network Technologies Claim Listing

Being an Ethical Hacker you will be able to Penetrate using the Vulnerability of the target systems. Due to much demand CEH holders are placed in the IT Industry to protect the company from Cyber criminals. To become a professional ethical hacker you need to make up yourselves with good focused.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Micireds Network Technologies Logo

img Duration

45 Days

Course Details

Being an Ethical Hacker you will be able to Penetrate using the Vulnerability of the target systems. Due to much demand CEH holders are placed in the IT Industry to protect the company from Cyber criminals. To become a professional ethical hacker you need to make up yourselves with good focused training.

Major topics are Basic terminology: white hat, gray hat, black hat- SQL injections, VPN, proxy, VPS and keyloggers, DoS attack, reverse shell, Aircrack-ng & reaver installation, Attacking wireless networks cracking WPA/WPA2, Virtual private network, Using known vulnerabilities, Cracking WPS pins with reaver.

 

Content:

  • Module 1 Introduction to ethical hacking
  • Module 2 Prerequisites for this course
  • Module 3 Basic terminology: white hat, gray hat, black hat
  • Module 4 Basic terminology: SQL injections, VPN, proxy, VPS and keyloggers
  • Module 5 VirtualBox installation
  • Module 6 VirtualBox installation through the repositories
  • Module 7 Creating a virtual environment
  • Module 8 Installing VirtualBox on Windows
  • Module 9 Kali Linux installation/setup
  • Module 10 VirtualBox Guest Additions installation
  • Module 11 Linux terminal basics
  • Module 12 Linux command line interface basics
  • Module 13 Tor browser setup
  • Module 14 Proxychains
  • Module 15 Virtual private network
  • Module 16 Changing your mac address with macchanger
  • Module 17 Footprinting with network mapper (nmap) and external resources
  • Module 18 Attacking wireless networks cracking WPA/WPA2
  • Module 19 Aircrack-ng & reaver installation
  • Module 20 Installing aircrack-ng on Windows & Crunch on Linux
  • Module 21 Aricrack-ng & crunch hacking example
  • Module 22 Cracking WPS pins with reaver pt- 1,2,3
  • Module 23 Performing denial of service attacks on wireless networks pt- 1,2
  • Module 24 SSL strip pt- 1,2,3
  • Module 25 Funny things pt- 1,2,3
  • Module 26 Evil twin pt- 1,2,3
  • Module 27 Using known vulnerabilities pt-1,2,3
  • Module 28 Post authentication exploitation (DNS) pt-1,2,3
  • Module 29 SQL injection pt-1,2,3,4,5
  • Module 30 Brute force methods for cracking passwords – cracking hashes
  • Module 31 Cracking linux passwords with john the ripper pt-1,2
  • Module 32 Cracking windows passwords with john the ripper
  • Module 33 Hydra usage pt- 1,2
  • Module 34 DoS attack pt.1 introduction to denial of service attacks
  • Module 35 DoS attack pt.3 featuring hackers.org
  • Module 36 Intro to metasploit and reverse shells
  • Module 37 Metasploit starting from a two terminal setup
  • Module 38 Making reverse shells persistent on another system and escalating privileges
  • Module 39 Creating a persistent shell with metasploit
  • Module 40 Using netcat to make any kind of connection you may need
  • Module 41 How to upload a reverse shell onto a web server
  • Puducherry Branch

    No:64, Lawspet Main Road, Puducherry

Check out more CEH (Certified Ethical Hacker) courses in India

Caddex Logo

Ethical Hacking Training

Ethical Hacking course is offered by Caddex. Our mission is to be the India’s favorite destination for discovering software to students through our various short-term and long term programs in India and abroad.

by Caddex [Claim Listing ]
GTP (Global Tech Promoters) Logo

Ethical Hacking & Cyber Security Training

With the third largest population of Internet users in the world, India's economic growth and success has made it an increasingly popular target for organized cyber crime and nation state cyber threats.

by GTP (Global Tech Promoters) [Claim Listing ]
Blue Shell Security Logo

CEH (Certified Ethical Hacker)

The CEH course in Kochi by Blue Shell Security is designed by the EC-Council, which is one of the global leaders in cybersecurity certification programs.

by Blue Shell Security [Claim Listing ]
Britain International Academy Logo

Ethical Hacking Course

The Certified Ethical Hacker CEH Certification In Kuwait is the core of the most desired information security training system any information security professional will ever want to be in.

by Britain International Academy [Claim Listing ]
Awdiz Logo

CEH v11 Training

Awdiz CEH certification training course provides you the hands-on training required to grasp the techniques hackers use to penetrate network systems and improve your system against it.

by Awdiz [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy