Ethical-Hacking

Ethical Hacking 

Course Description

Have you ever wondered exactly how hackers ‘hack’? Do words like firewalls, encryption, biometrics, and malware sound confusing to you? Have you been looking for a course that teaches you all the basics of both information and cybersecurity in a really interesting way? If so then you are going to find this course absolutely perfect for you. This is a course that is perfect as an introductory one for individuals and students who are interested in becoming cybersecurity or information security professionals. It is also ideal for students who just want to have a well-rounded knowledge about the basic concepts used in the world of information security. From this course, you will get to know each concept so that you can learn it in a better way.

Return To Chekout

Here is the Demo Video of this Course

Course Curriculum

Course Content

Read Me
Read Me
Section 1: Introduction
Introduction To Cyber Security
Types Of Hacker
Phases Of Hacking
Career Opportunities
Section 2: Creating Your Virtual Lab
Installing Kali & Metasploitable
Linux Basics
Linux File Permissions
IPv4
IPv6
Section 3: Networking
NAT (Network Address Translation)
OSI Layer
Other Networking Terms & Devices
Information Gathering (Part-1)
Information Gathering (Part-2)
Section 4: Information Gathering & Scanning
Information Gathering (Part-3)
Information Gathering (Part-4)
Scanning
Understanding Google Hacking
Google Docks
Section 5: Google Hacking
Introduction to Metasploit Framework
System Hacking (WIndows XP)
Section 6: Metasploit Framework
Hacking Linux with Metasploit
Introduction to Armitage
Searching Internet with Shodan
Using Shodan on Metasploit
Shodan
Malwares (Part-1)
Malwares (Part-2)
Section 7: Malwares
Countermeasures of Malware
Wi-Fi Terms (Part-1)
Wi-Fi Terms (Part-2)
Section 8: WiFi Hacking
Understanding 802.11x
WPA2 Cracking
Introduction to Web Applications
Brute Force Attack
Section 9: Web App Security
Arbitrary Code Execution
CSRF
SQL Injection
XSS
Shell Exploits
Introduction to DoS
Types of DoS attack
Section 10: Denial of Service
Introduction to DDoS
Prevention of DoS Attacks
Introduction to Cryptography
Basic Cryptography Techniques
Section 11: Cryptography
CryptoSystem
Various Type of Encryption
Enigma and other Cryptography Service
Firewall
Various types of Firewalls (Part-1)
Section 12: Firewall,IDS &IPS
Various types of Firewalls (Part-2)
IDS
IPS
Bandit (1-5)
Bandit (6-10)
Form for Internship/Project Letter
Read Me
Form