ADVANCED ETHICAL HACKING
ONLINE TRAINING OFFLINE TRAINING WORKSHOPS
ME
CO R
CERTIFIED ETHICAL HACKER
BE E TRAINERS WITH OVER 5+ YEARS
ACK OF EXPERIENCE
AH
COURSE CONTENT
Networking
Ethical Hacking
Vulnerability Assessment
Advanced Ethical Hacking
It' s not Bookish Hacking.
It’s Actual Hacking.
When it comes to the world of hacking, theoretical knowledge can only take you so far. In a landscape
that is constantly evolving and changing, practical, real-world experience is essential. It signifies a
hands-on, experiential approach to hacking, where the understanding of vulnerabilities and security
breaches isn’t merely academic, but grounded in real-world scenarios and practical application. This
tagline asserts the importance of lived experience in the field of hacking, conveying a message of
expertise and proficiency that goes beyond mere book knowledge.
DRIVING PROGRESSION,
EMPOWERING SECURITY.
COURSE PREREQUISITES
No Coding Required.
Basic knowledge of Computer Systems.
One year in an information security role or equivalent experience is beneficial.
Ability to read and understand PHP code will help, although it is not mandatory
CLASSROOM TRAINING
When it comes to quality instruction in a classroom training experience a more
stimulating learning environment with our optimized mix of lecture, hands-on
practice, when you have doubts our instructors are available to clear and ensure you
comprehend the course and knowledge.
ONLINE TRAINING
We are providing training through Online LIVE with a real time live instructor. The
live instructor teaches the course and provides the opportunity for students to ask
live questions via voice or instant message during the live training event with
practicals
WORKSHOPS
We conduct workshops and seminars in Information Security. Ethical Hacking &
Information Security Workshop will teach you how to protect yourself from the
cyber attacks and make yourself come to know how to secure your organization
from hackers.
What is this Course about ?
Advanced Ethical Hacking
Ethical hacking is the practice of testing computer
systems, networks, or web applications for
security vulnerabilities with the permission of the
system owner. It involves simulating real-world
cyber attacks to identify weaknesses that
malicious actors could exploit.
Modules Covered - Ethical Hacking Course
What will you learn?
10+ hacking tools such as Metasploit, Aircrack-ng, SQLmap, etc.
30+ hands-on real-life hacking examples.
No prior knowledge required Hack & secure WiFi & wired networks.
Hack servers.
Create backdoors & Hack Windows.
Start from 0 up to a high-intermediate level.
Discover & exploit web application vulnerabilities to hack websites.
Learn Network Hacking / Penetration Testing.
Learn about the different hacking fields & hackers.
Install a hacking lab & needed software (on Windows, OS X and Linux).
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Install & use Kali Linux - a hacking operating system.
Linux basics.
Linux commands How to use the Linux terminal.
Network basics & how devices interact inside a network.
Run attacks on networks without knowing its key.
Control Wi-Fi connections without knowing the password.
Create a fake Wi-Fi network with internet connection & spy on clients.
Crack WEP/WPA/WPA2 encryptions.
ARP Spoofing / ARP Poisoning.
Launch various Man In The Middle attacks. Access any account accessed by
Sniff network traffic & analyse it to extract important info
such as: passwords, cookies, urls, videos, images ..etc.
Intercept network traffic & modify it on the fly.
Discover devices connected to the same network.
Inject Javascript in pages loaded by clients connected to the
same network.
Redirect DNS requests to any destination (DNS spoofing).
Secure networks from the discussed attacks. Edit router
settings for maximum security.
Discover suspicious activities in networks.
How to prevent MITM attacks. Discover open ports, installed
services and vulnerabilities on computer systems.
Exploit buffer over flows & code execution vulnerabilities to
gain control over systems.
Hack systems using client side attacks.
Hack Windows using fake updates. Backdoor normal
programs.
Backdoor any file type such as pictures, pdf' s ...etc.
Gather information about people, such as emails, social
media accounts, emails and friends.
Hack secure systems using social engineering.
And many More ...
NETWORKING
Introduction to Networking
Types of Networks
UDP
TCP/IP
TCP/IP Three-Way Handshake
TCP Flags
Network & Networking
Network Types
Network Topologies
Network Devices
Internet
Intranet
Extranet
IP Address
Subnet Mask
HTTP & WWW
HTTP Request Methods
HTTP Response Codes
OSI Model (Open System Interconnection)
1.Application Layer
2.Presentation Layer
3.Session Layer
4.Transport Layer
5.Network Layer
6.Data-Link Layer
7.Physical Layer
ADVANCED ETHICAL HACKING
Hacker Lab Setup
VMware Setup in PC
Kali Linux Installation in Virtualbox
Metasploitable – Vulnerable Web Server
DVWA Setup
Kali Linux for Hackers
Introduction to Kali Linux (Theory)
History of Kali Linux (Theory)
Linux Distribution (Theory)
Kernel (Theory)
Shell (Theory)
Linux File System (Theory)
Kali Linux Installation in Virtual Box
Linux Repositories (/etc/apt/sources.list)
Command Line Interface (Explanation)
Root User (sudo su)
Install & Uninstall
Commands
Users & Groups
Permissions
Local Server (File Sharing Through LAN)
Introduction to Ethical Hacking
Cyber Kil1 Chain
Methodology
CIA Triad
5 Phases of Ethical H4ck1ng
Types of Hackers
Security Researchers, Analysts, Auditors etc...
ADVANCED ETHICAL HACKING
Information Gathering (Footprinting)
Who is
Virus total
Shodan
GHDB (Google Hacking Data Base)
The Harvester tool
Nikto Tool
Information Gathering from Social Media
Maltego - Advanced tool Image
Metadata
Sublist3r
Dmitry
Wappalyzer
Extension
Netcraft
NMAP Scanning (Network Scanning)
Network Scanning with NMAP
Server Scanning with NMAP
Host Discovery
Port Discovery
Service Version
Detection OS Discovery
Anonymity
Dark web, Deep web and Surface web
VPN (Virtual Private Networks)
Proxy Chains
Tor Browser, Onion url etc..
ADVANCED ETHICAL HACKING
Net Cat (Powerful tool for pentesters)
Port Scanning with Netcat (TCP and UDP)
Chatting between two users (Initiator and listener)
Banner grabbing (FTP and SSH)
with Netcat File Transfer with Netcat
Grabbing the HTTP Banner
Windows Reverse Connection
Metasploit (Pentester Tool)
Server Enumeration with Metasploit
Detail Explanation of Modules
1. Exploit Module
2. Payload Module
3. Auxiliaries Module
4. Encoder Module
5. Evasions Module
6. Post Module
Exploiting the Victim Machine
Setting up LHOST and RHOST to get access
Creating a payload using msfvenom
Web Server Hacking
Scanning with NMAP
Using Searchsploit tool for finding CVE
Finding the exploit in Rapid7
Using Pen testing tool (Metasploit)
FTP Service Scanning
VSFTPD Exploitation
ADVANCED ETHICAL HACKING
BeEF (Browser Exploitation Framework)
What is the Browser Exploitation Framework?
Create a link with beef
Exploit the web browser
Advancement of Tool
Ngrok Configuration with beef
Performing exploitation in LAN Connection
Performing exploitation in WAN Connection
JavaScript hook port forwarding URL
Malware
What is Malware and its Types?
What is Spyware?
What is Worms?
What is Trojans?
What is Viruses?
What is Ransomware?
Vulnerability Analysis
What are Vulnerabilities?
OWASP ZAP Tool
Nessus Application
Scanning the webserver
Reporting Methodology
Installation of the Tools
Vulnerability Assessments
ADVANCED ETHICAL HACKING
System Hacking
OS Bypassing
Error Generation Method (Cracking Password)
Ngrok configuration
Windows Reverse Shell
Windows Machine
Hacking Getting the live screen with VNC
Mobile Hacking
Introduction to Mobile OS
Creating reverse shell with msfvenom
Binding the reverse shell
Tunnel forwarding with an open-source tool
Getting Access in the WAN connection
Getting Access to LAN connection
Exploiting the Mobile Platforms
Social Engineering
Introduction to Social Engineering
Types of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering
Phishing (Zphisher)
1. Facebook Hacking
2. Instagram Hacking
Location Tracking
Camera Hacking
ADVANCED ETHICAL HACKING
Sniffing
Introduction to Sniffing
Introduction to Wireshark tool
Analyzing the data packets from Wireshark
Introduction to Bettercap
ARP spoofing
Performing DNS Spoofing attack
Man-in-the-Middle Attack – ARP Poisoning
DOS/DDOS (Distributed Denial-of-Service Attack)
Introduction to Denial-of-Service attack
Introduction to Distributed Denial-of-Service attack
Introduction to Botnets
Syn Flooding (DOS) attack
Perform a DOS attack using Hping3
Perform a DDOS attack using HOIC
Perform a DDOS attack using LOIC
Wireless Hacking
Wireless Encryptions WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access)
Hacking Wi-Fi Networks
Wi-Fi Deauther Attack
Brute forcing the WI-Fi Networks
Introduction to Service Defined Radio
ADVANCED ETHICAL HACKING
Password Cracking
Hack FTP
Passwords Hack Linux Password
Crack SSH Password Crack
Telnet Password
Cryptography
Types of Cryptography
Symmetric Key
Asymmetric key
Encryption Algorithms
Decoding and Encoding
Hide plain text in files (Steganography)
Configuring Steghide tool
Hiding Text in an Image