Practical Training on Ethical Hacking or Penetration Testing

Practical Training on Ethical Hacking or Penetration Testing

Practical Course on Ethical Hacking or Penetration Testing

Module 1: Fundamental of Ethical Hacking

  • Basic Talk on Cyber Crimes Scenario
  • Types of Hackers and Hacking – An Overview
  • High career growth in Ethical Hacking and Cyber Security

Module 2: Virtual LAB Setup for Practicing at Home

  • Overview and Importance of LAB Setup
  • Download and Install Virtualbox on Windows
  • Create Attacker Machine – Kali Linux inside Virtualbox
  • Create Victim Machine 1 – Metasploitable 2
  • Create Virtual Victim Machine 2 – Windows 10
  • Understand the Virtual Networking Between Virtual Machines

Module 3: Best Practice for Information gathering [Active/Passive]

  • Overview and Objective of Information Gathering
  • Information Gathering by using Search Engine
  • Information Gathering by using Social Sites
  • Information Gathering About Websites
  • Gather Domain owner’s Personal Details Whois Database
  • Information Gathering about DNS and MAIL server
  • Collecting Emails and retrieve Information from Emails

Module 4: Know More About Your Target - Scanning and Enumeration

  • Overview and Importance of Network Scanning
  • Scan Network for Live Hosts in reachable Network
  • Scan Hosts in Network for Open Ports
  • Different Techniques are used against Port Scanning
  • Enumeration with nmap Script Engine
  • Detect service version and OS detail
  • Nmap – Scan result & Output result

Module 5: Google Hacking and Google Hacking Database

  • Overview of Google Hacking – Why hackers use it
  • Overview of Google Operators
  • Overview of Google Hacking Database

Module 6: Windows Hacking and Security

  • Hacking Windows 7, 8.1 and 10.
  • How to Change Windows 10 Password, if you dont know Current Password
  • Change Windows Password By backdoor
  • Bypass Windows Login Screen Administrator User
  • Dump Windows 10 Password Hashes and Crack those
  • Enable Syskey Password to Protect Windows 10

Module 7: Password Cracking Techniques

  • Overview of Password Cracking and Types
  • Creating a Dictionary for Cracking Passwords – Method 1
  • Creating a Dictionary for Cracking Passwords – Method 2
  • Rule-Based Dictionary Attack for Offline Attack
  • Cracking Online Services – SSH, FTP etc
  • Zip Password Cracking with Bruteforce Attack
  • Collect Username and Password using Keylogger

Module 8: Protect Your Data from Hacker's EYE

  • NTFS Data Stream in Action
  • Detect Alternate Data stream – ADS
  • Overview of Steganography
  • Steganograpy in Action – Method 1
  • Steganograpy in Action – Method 2
  • Overview of Encryption for Protecting Data
  • EFS in Action and Backup Certificate
  • Circumstances of Losing EFS Data and Recovery
  • Bitlocker and Bitlocker Go in Action
  • Encryption in Action – Part 1
  • Encryption in Action – Part 2

Module 9: Trojan and Virus

  • Overview of Trojan
  • Trojan Infection and Evading Techniques
  • Trojan Detection Techniques
  • Check open Ports on Local Machine
  • Check Running Processes on Local Machine
  • Check for Registry Changes
  • Find Untrusted Drivers
  • Service Monitor
  • Startup Monitor
  • Check Network Activity and Status
  • Countermeasure from Trojan

Module 10: Honeypot

  • Overview and Types of Honeypot
  • Honeypot in Action

Module 11: Proxy Server

  • Overview of Proxy Server
  • Types of Proxy Server
  • Configure Proxy for Browsers Only
  • Bounce your IP and Location like a Pro Hacker
  • Proxy Server in Action

Module 12: Network Security and Hacking

  • Basic understanding about Network and Devices
  • Flooding attack against Victim’s MAC Address
  • ARP Spoofing attack in LAN
  • Detect ARP Spoofing Attack on Windows
  • MAC Spoofing Attack in Windows and Linux
  • Sniffing Network and steal Username and Password
  • DHCP starvation attack

Module 13: Social Engineering

  • Overview of Social Engineering
  • Types of Social Engineering
  • Types of Social Engineering and Human-based SE
  • Computer-Based Social Engineering
  • Mobile Based Social Engineering

Module 14: Social Sites Hacking and Protection

  • Reality Behind Hacking of Social Sites
  • Advance Phishing Attack Against Facebook
  • Stealing Saved Password from Browser
  • Hijack the Session of Facebook

Module 15: Metasploit Framework - All in One Hacking Console

  • Getting started with Metasploit Framework
  • Component of Metasploit Framework
  • Authentication Bruteforcing Against Online Services
  • Metasploit GUI Armitage
  • Armitage One More Step
  • msfvenom Create Trojan for Windows
  • Client Side Attack Linux Trojan

Module 16: Wireless Hacking - WPA/WPA2 Encryption

  • Enable WEP in WiFi Router
  • Cracking Wirerless Encryption WEP
  • Enable WPA in WiFi Router
  • Cracking WiFi WPA and WPA2 Encryption

Who Can Attend the Course?

  • IT System Professional
  • Non-IT people
  • Art college students ( Maths, Commerce)
  • Programmers
  • Network and Security professionals
  • IT Managers
  • Directors
  • VPs
  • Sales team

Course Duration Details

Course Duration: 40 Hrs.

Mentoring Session: 10 Hrs.

Total Training Hours ( Approx): 50 Hrs.

Get A Free Registration!