E.H(ETHICAL HACKING)
Ethical hacking has gained huge popularity in the recent years. With the rise in usage of internet technology, internet security has become a matter of concern for us. Time and again, we come across instances of data theft, identity theft, online monetary fraud etc.Hacking deals with breaking into a computer network, system or internet entity by exploiting its weaknesses and/or loopholes. There are two sides to hacking – ethical hacking and black hat hacking (regular hacking).Ethical hackers hack into computer networks, systems and internet entities of organizations and companies. They hack into these systems to find out flaws, loopholes and security vulnerabilities present within the system.In short, ethical hackers investigate and find out flaws in networks, systems and web entities. The ultimate aim of an ethical hacker is to identify vulnerabilities in the system and patch it up in a timely manner!Black hat hackers (or regular hackers) hack into systems with bad intention (for their personal benefit). On the other hand, ethical hackers break into systems to identify its vulnerabilities and patch it up!In this digital age, internet technology plays a very important role in our day to day lives. We rely on internet for banking, shopping, education and entertainment.
- Ethical Hacking is a 6 months Certificate Course.
- Advance Diploma In Cyber security Ethical Hacking is a 12 months Diploma Course
| DURATION | QUALIFICATION | COMPUTER QUALIFICATION |
|---|---|---|
| 6 MONTHS & 12 MONTHS | 12th | BASIC COMPUTER KNOWLEDGE |
Course Module:
- Understanding Operating Systems
- Understanding Application
- Setting up a Computer
- Connecting to the Internet
- Understanding Cloud
- Protect your computer
- Computer Network, Hardware And Software
- Number System and Conversion
- Open-Source Software
- Primary Memory & Secondary Memory
- Partition Your Storage Disk
- Logical Partition vs Primary Partition
- Input Output Port
- Computer System Workflow
- BIOS
- Booting Process
- File System
- FAT32, NTFS, EXT2/3/4, SWAP, HFS+
- Master boot record vs Gpt
- 32 bit vs 64 bit
- System Troubleshooting
- Programming Language Generations
- Command line, Text-fu, Advanced text-fu, User management
- Permission, Processes, packages devices, The filesystem, Boot the system
- Kernel, Init, Process Utilization, Logging Network Sharing
- Network Basics, Subnetting, Routing
- Network Config, Troubleshooting, DNS
- Introduction to Ethical Hacking
- Phases Of Hacking
- Understanding Penetration Testing
- Cyber Law and IT Act
- IP Address and Subnetting, Tracing & Spoofing
- LAN, WAN, MAN
- TCP & OSI Model
- Virtual Private Network (VPN)
- Active Footprinting
- Passive Footprinting
- Enumeration
- Email Hacking and Security
- Clickjacking
- Google Hacking Database (GHDB)
- Sniffing Through linux Tools
- Wireshark
- Nmap Scanning & Scripting
- Netdiscover
- Man in the Middle Attack (MITM) (Windows and Linux)
- Ettercap, Cain & Abel
- WEP/WPA/WPA2 Hacking & Security
- Evil Twin Attack
- Virus, Worm, Trojans
- DoS & DDoS Attacks
- Basics of Web Hack Security
- SQL Injection
- Admin Login Authentication Bypass & Mod_Security Bypassing
- Evading IDS, Firewalls
- Honeypots
- Buffer Overflow
- Cryptography
- Cryptanalysis
- Internet of Things (IOT)
- Metasploit Framework
- Operating Linux tools using DOCKER
- Analysis on Ransomwares and Prevention Approach
- Assembly language
- Reverse Engineering
- Cloud Security
- Live Practical
- Multiple Hands-on Challenges
- Web Application working Mechanism, SQL Basics, DNS ENUM
- SQL injection, Google Dorks, Exploits
- Hostile Subdomain Takeover
- Burp Suite Proxy
- WAF Bypass, Error Based SQL Injection
- Blind SQL Injection
- SQL MAP , HAVIJ, SQL NINJA
- XSS (Cross Site Scripting)
- OS Command Injection OR RCE
- File Inclusion Vulnerability and Directory Traversal
- LDAP Injection
- DVWA Framework
- XXE (XML EXTERNAL ENTITY)
- CSRF
- ACUNETIX SCANNER
- NETSPARKER, NIKTO, WP-Scan
- NESSUS SCANNER, VEGA
- XMLRPC Vulnerability
- Security misconfiguration, Information Disclosure (Directory Listing)
- HTML Injection
- Source Code Disclosure
- Broken Access Contro
- Upload File Restriction Vulnerability
- Host Header Injection
- Broken Authentication
- Session Fixation and Hijacking
- Server Side Request Forgery
- Mutillidae Practice
- Parameter Tampering
- Report Generating
- Examination
- Live Practical
- Multiple Hands-on Challenges
- CTF Challenges
- POC for Different Vulnerability
- Introduction to Networking
- OSI Model
- TCP/IP
- IPv4 vs IPv6
- Brief Information About Network Devices
- Exploring the Functions of Routing
- Cisco Packet Tracer
- Configuring a Cisco Router
- Packet Flow in Same Network & Different Network
- Router vs Switch vs Hub
- Network Topology
- IP/ICMPy
- APIPAy
- Hybrid Protocolsy
- Address Resolution Protocol (ARP)
- Static: Nexthop/Exit Interfacey
- Dynamic: RIP, EIGRP, OSPF & BGP
- Wan Technologiesy
- Troubleshooting Basic Connectivity
- NAT
- ACL
- DHCP (Dynamic Host Configuration Protocol)
- Telnet and SSH
- Lord Blockchain Protocol
- Layer 2 Protocols
- VLAN
- Port Security
- Computer Forensics Introduction
- Computer Forensics Investigator Steps
- Understanding Computer Hard Disks
- Windows Forensics
- File system Analysis Linux/Windows
- Windows File System Forensics
- Computer Forensics Lab
- Setting up Forensics Lab
- Data recovery
- Access Data FTK Investigator
- Investigation By EnCase
- AutoSpy Kali
- Steganography
- Website Attacks Investigations
- Email Header Analysis
- Investigation By EnCase
- Dumpit & Volatility Framework
- Substitution ciphers and Transposition ciphers
- Principals of public key crypto systems
- RSA algorithm & RSA security
- Key management & Distribution in Public Key System
- Diffle-Hellman key exchange algorithm
- Data encryption standard (DES)
- Advanced Encryption Standard (AES)
- MACS, MD5 message digest algorithm, Secure hash algorithm(SHA)
- Digital Signatures & Digital Certificates
- Kerberos and X.509
- Electronic mail security-pretty good privacy (PGP)
- Analysis on Case Studies
- Hard drive Evidence Investigation
- Becoming a Forensic Expert
- Installing Python & PyCharm (Windows) or Visual Studio (Linux)
- Setup & Hello World
- Variables, Data Types and Operators
- Relational and Boolean Operators
- Working With Strings
- Working With Numbers
- Getting Input From Users
- Building a Basic Calculator
- Lists
- List Functions
- Tuples
- Functions
- Return Statement
- If Statements & Comparisons
- Building a better Calculator
- Error Handling
- Dictionaries
- While and For Loops
- Image Processing (Open CV)
- Importing Modules and Socket Programming
- Comprehensive XSS
- Host Header Injection
- URL Redirection
- Parameter Tampering
- HTML Injection
- File Inclusion
- Missing/Insufficient SPF Record
- Insecure CORS Configuration
- Server Side Request Forgery
- Critical File Found
- Source Code Disclosure
- Cross Site Request Forgery
- Hostile Subdomain Takeover
- SQL Injection
- Command Injection
- File Uploading
- XML External Entity Injection
- Bonus Tips
- Introduction to Mobile Application security
- Android architecture
- Interaction with android
- Reverse engineering apk
- Pentesting with owasp top-10
- Pentesting with drozer
- Hands on with mobsf
- Hands on with QARK
- Rooting android devices
- Tools(Astra Security , ZAP (Zed Attack Proxy), Burp Suite , Mobile Security Framework (MobSF) , Kali Linux NetHunter, Data Theorem)
- Port Scanner
- Sniffer
- Nmap Package
- Fuzzers
- Hash Lib
- SQLi Checker
- Keylogger

