KEMBAR78
Cybersecurity - The Future | PDF | Computer Network | Denial Of Service Attack
0% found this document useful (0 votes)
53 views14 pages

Cybersecurity - The Future

The document outlines an Advanced Ethical Hacking course that offers both online and offline training, emphasizing practical, real-world experience over theoretical knowledge. It covers a wide range of topics including networking, vulnerability assessment, and various hacking techniques, with no coding required as a prerequisite. The course aims to equip participants with hands-on skills using tools like Metasploit and Wireshark, and includes workshops to enhance understanding of cybersecurity measures.

Uploaded by

abk7013270196
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views14 pages

Cybersecurity - The Future

The document outlines an Advanced Ethical Hacking course that offers both online and offline training, emphasizing practical, real-world experience over theoretical knowledge. It covers a wide range of topics including networking, vulnerability assessment, and various hacking techniques, with no coding required as a prerequisite. The course aims to equip participants with hands-on skills using tools like Metasploit and Wireshark, and includes workshops to enhance understanding of cybersecurity measures.

Uploaded by

abk7013270196
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

ADVANCED ETHICAL HACKING

ONLINE TRAINING OFFLINE TRAINING WORKSHOPS

ME
CO R
CERTIFIED ETHICAL HACKER

BE E TRAINERS WITH OVER 5+ YEARS

ACK OF EXPERIENCE

AH

COURSE CONTENT
Networking
Ethical Hacking
Vulnerability Assessment
Advanced Ethical Hacking
It' s not Bookish Hacking.
It’s Actual Hacking.
When it comes to the world of hacking, theoretical knowledge can only take you so far. In a landscape
that is constantly evolving and changing, practical, real-world experience is essential. It signifies a
hands-on, experiential approach to hacking, where the understanding of vulnerabilities and security
breaches isn’t merely academic, but grounded in real-world scenarios and practical application. This
tagline asserts the importance of lived experience in the field of hacking, conveying a message of
expertise and proficiency that goes beyond mere book knowledge.

DRIVING PROGRESSION,
EMPOWERING SECURITY.
COURSE PREREQUISITES
No Coding Required.
Basic knowledge of Computer Systems.
One year in an information security role or equivalent experience is beneficial.
Ability to read and understand PHP code will help, although it is not mandatory

CLASSROOM TRAINING
When it comes to quality instruction in a classroom training experience a more
stimulating learning environment with our optimized mix of lecture, hands-on
practice, when you have doubts our instructors are available to clear and ensure you
comprehend the course and knowledge.

ONLINE TRAINING

We are providing training through Online LIVE with a real time live instructor. The
live instructor teaches the course and provides the opportunity for students to ask
live questions via voice or instant message during the live training event with
practicals

WORKSHOPS

We conduct workshops and seminars in Information Security. Ethical Hacking &


Information Security Workshop will teach you how to protect yourself from the
cyber attacks and make yourself come to know how to secure your organization
from hackers.
What is this Course about ?
Advanced Ethical Hacking
Ethical hacking is the practice of testing computer
systems, networks, or web applications for
security vulnerabilities with the permission of the
system owner. It involves simulating real-world
cyber attacks to identify weaknesses that
malicious actors could exploit.

Modules Covered - Ethical Hacking Course


What will you learn?
10+ hacking tools such as Metasploit, Aircrack-ng, SQLmap, etc.
30+ hands-on real-life hacking examples.
No prior knowledge required Hack & secure WiFi & wired networks.
Hack servers.
Create backdoors & Hack Windows.
Start from 0 up to a high-intermediate level.
Discover & exploit web application vulnerabilities to hack websites.
Learn Network Hacking / Penetration Testing.
Learn about the different hacking fields & hackers.
Install a hacking lab & needed software (on Windows, OS X and Linux).
Discover vulnerabilities & exploit them to hack into servers.
Hack secure systems using client-side & social engineering.
Secure systems from all the attacks shown.
Install & use Kali Linux - a hacking operating system.
Linux basics.
Linux commands How to use the Linux terminal.
Network basics & how devices interact inside a network.
Run attacks on networks without knowing its key.
Control Wi-Fi connections without knowing the password.
Create a fake Wi-Fi network with internet connection & spy on clients.
Crack WEP/WPA/WPA2 encryptions.
ARP Spoofing / ARP Poisoning.
Launch various Man In The Middle attacks. Access any account accessed by

Sniff network traffic & analyse it to extract important info


such as: passwords, cookies, urls, videos, images ..etc.
Intercept network traffic & modify it on the fly.
Discover devices connected to the same network.
Inject Javascript in pages loaded by clients connected to the
same network.
Redirect DNS requests to any destination (DNS spoofing).
Secure networks from the discussed attacks. Edit router
settings for maximum security.
Discover suspicious activities in networks.
How to prevent MITM attacks. Discover open ports, installed
services and vulnerabilities on computer systems.
Exploit buffer over flows & code execution vulnerabilities to
gain control over systems.
Hack systems using client side attacks.
Hack Windows using fake updates. Backdoor normal
programs.
Backdoor any file type such as pictures, pdf' s ...etc.
Gather information about people, such as emails, social
media accounts, emails and friends.
Hack secure systems using social engineering.
And many More ...
NETWORKING
Introduction to Networking
Types of Networks
UDP
TCP/IP
TCP/IP Three-Way Handshake
TCP Flags
Network & Networking
Network Types
Network Topologies
Network Devices
Internet
Intranet
Extranet
IP Address
Subnet Mask
HTTP & WWW
HTTP Request Methods
HTTP Response Codes

OSI Model (Open System Interconnection)


1.Application Layer
2.Presentation Layer
3.Session Layer
4.Transport Layer
5.Network Layer
6.Data-Link Layer
7.Physical Layer
ADVANCED ETHICAL HACKING
Hacker Lab Setup
VMware Setup in PC
Kali Linux Installation in Virtualbox
Metasploitable – Vulnerable Web Server
DVWA Setup

Kali Linux for Hackers


Introduction to Kali Linux (Theory)
History of Kali Linux (Theory)
Linux Distribution (Theory)
Kernel (Theory)
Shell (Theory)
Linux File System (Theory)
Kali Linux Installation in Virtual Box
Linux Repositories (/etc/apt/sources.list)
Command Line Interface (Explanation)
Root User (sudo su)
Install & Uninstall
Commands
Users & Groups
Permissions
Local Server (File Sharing Through LAN)

Introduction to Ethical Hacking


Cyber Kil1 Chain
Methodology
CIA Triad
5 Phases of Ethical H4ck1ng
Types of Hackers
Security Researchers, Analysts, Auditors etc...
ADVANCED ETHICAL HACKING
Information Gathering (Footprinting)
Who is
Virus total
Shodan
GHDB (Google Hacking Data Base)
The Harvester tool
Nikto Tool
Information Gathering from Social Media
Maltego - Advanced tool Image
Metadata
Sublist3r
Dmitry
Wappalyzer
Extension
Netcraft

NMAP Scanning (Network Scanning)


Network Scanning with NMAP
Server Scanning with NMAP
Host Discovery
Port Discovery
Service Version
Detection OS Discovery

Anonymity
Dark web, Deep web and Surface web
VPN (Virtual Private Networks)
Proxy Chains
Tor Browser, Onion url etc..
ADVANCED ETHICAL HACKING
Net Cat (Powerful tool for pentesters)
Port Scanning with Netcat (TCP and UDP)
Chatting between two users (Initiator and listener)
Banner grabbing (FTP and SSH)
with Netcat File Transfer with Netcat
Grabbing the HTTP Banner
Windows Reverse Connection

Metasploit (Pentester Tool)


Server Enumeration with Metasploit
Detail Explanation of Modules
1. Exploit Module
2. Payload Module
3. Auxiliaries Module
4. Encoder Module
5. Evasions Module
6. Post Module
Exploiting the Victim Machine
Setting up LHOST and RHOST to get access
Creating a payload using msfvenom

Web Server Hacking


Scanning with NMAP
Using Searchsploit tool for finding CVE
Finding the exploit in Rapid7
Using Pen testing tool (Metasploit)
FTP Service Scanning
VSFTPD Exploitation
ADVANCED ETHICAL HACKING
BeEF (Browser Exploitation Framework)
What is the Browser Exploitation Framework?
Create a link with beef
Exploit the web browser
Advancement of Tool
Ngrok Configuration with beef
Performing exploitation in LAN Connection
Performing exploitation in WAN Connection
JavaScript hook port forwarding URL

Malware
What is Malware and its Types?
What is Spyware?
What is Worms?
What is Trojans?
What is Viruses?
What is Ransomware?

Vulnerability Analysis
What are Vulnerabilities?
OWASP ZAP Tool
Nessus Application
Scanning the webserver
Reporting Methodology
Installation of the Tools
Vulnerability Assessments
ADVANCED ETHICAL HACKING
System Hacking
OS Bypassing
Error Generation Method (Cracking Password)
Ngrok configuration
Windows Reverse Shell
Windows Machine
Hacking Getting the live screen with VNC

Mobile Hacking
Introduction to Mobile OS
Creating reverse shell with msfvenom
Binding the reverse shell
Tunnel forwarding with an open-source tool
Getting Access in the WAN connection
Getting Access to LAN connection
Exploiting the Mobile Platforms

Social Engineering
Introduction to Social Engineering
Types of Social Engineering
Human-based Social Engineering
Computer-based Social Engineering
Phishing (Zphisher)
1. Facebook Hacking
2. Instagram Hacking
Location Tracking
Camera Hacking
ADVANCED ETHICAL HACKING
Sniffing
Introduction to Sniffing
Introduction to Wireshark tool
Analyzing the data packets from Wireshark
Introduction to Bettercap
ARP spoofing
Performing DNS Spoofing attack
Man-in-the-Middle Attack – ARP Poisoning

DOS/DDOS (Distributed Denial-of-Service Attack)


Introduction to Denial-of-Service attack
Introduction to Distributed Denial-of-Service attack
Introduction to Botnets
Syn Flooding (DOS) attack
Perform a DOS attack using Hping3
Perform a DDOS attack using HOIC
Perform a DDOS attack using LOIC

Wireless Hacking
Wireless Encryptions WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access)
Hacking Wi-Fi Networks
Wi-Fi Deauther Attack
Brute forcing the WI-Fi Networks
Introduction to Service Defined Radio
ADVANCED ETHICAL HACKING
Password Cracking
Hack FTP
Passwords Hack Linux Password
Crack SSH Password Crack
Telnet Password

Cryptography
Types of Cryptography
Symmetric Key
Asymmetric key
Encryption Algorithms
Decoding and Encoding
Hide plain text in files (Steganography)
Configuring Steghide tool
Hiding Text in an Image

You might also like