OVERVIEW
Ethical Hacking and Penetration testing course provides the skills required for a candidate to become a Security Professional. The skills acquired through this course can make one to understand the essential concepts to perform penetration testing, uncover the vulnerability and solutions mitigate the risk of attack. In this course we will also discuss the scenarios with few advanced tools to identify, detect, and exploit any vulnerability uncovered in the target network environment. The interesting part of this course is that we will have more practical demos to understand the theoretical concepts.
Objective
In this course, you will learn:
Overview of Information and Cyber Security
Hacking and Ethical Hacking concepts
Five Phases of Hacking
Using tools for scanning and Vulnerability Assessment
Malware based Attacks
Man-in-the-Middle Attack
VAPT of Web Servers and Web Application Servers
Wireless Hacking
Target Audience
This course is for Students / IT Professionals who is interested in becoming Information Security and Cyber Security professional.
Prerequisites
For taking this course, knowledge about Networking Basics and Servers will be an essential.
Good knowledge on TCP/IP, IP Address, Subnet, Ports and Protocols in Networking.
Good Knowledge on Windows and Linux Servers including DNS, DHCP, Web Server, FTP Server and Active Directory.
Module 1 : Introduction to Information Security
Information Security Overview
Hacking and Ethical Concepts
Hacking Phases
Information Security Controls
Penetration Testing Overview
Module 02 : Footprinting
Footprinting Concepts
Footprinting through Search Engines
Footprinting through Web Services
Footprinting through Social Networking Sites
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Assessment
Vulnerability Assessment Concepts
Vulnerability Assessment Solutions
Vulnerability Scoring Systems
Vulnerability Assessment Tools
Vulnerability Assessment Reports
Module 06: System Hacking
System Hacking Concepts
Cracking Passwords
Escalating Privileges
Executing Applications
Hiding Files
Covering Tracks
Module 07: Malware Threats
Malware Concepts
Trojan Concepts
Virus and Worm Concepts
Malware Analysis
Countermeasures
Anti-Malware Software
Module 08: Sniffing
Sniffing Concepts
Sniffing Technique: MAC Attacks
Sniffing Technique: DHCP Attacks
Sniffing Technique: ARP Poisoning
Sniffing Technique: Spoofing Attacks
Sniffing Technique: DNS Poisoning
Module 09: Web Servers/Application VAPT
Web Server/Application Assessment Methodology
Web Server/Application Assessment Tools
Web Server/Application VAPT and Reporting
Module 10: Wireless Network VAPT
Wi-Fi Authentication Modes
Wireless Encryption Protocols
Wireless Network VAPT and Reporting