ethical-hacking-course

Ethical Hacking Training

Ethical Hacking Training

Gurukull infosystems offers best Ethical Hacking Training with most experienced professionals. Our Instructors are working in Ethical Hacking and related technologies for more years in MNC's. We aware of industry needs and we are offering Ethical Hacking Training in more practical way. Our team of Ethical Hacking trainers offers Ethical Hacking in Classroom training, Ethical Hacking Online Training and Ethical Hacking Corporate Training services. We framed our syllabus to match with the real world requirements for both beginner level to advanced level. Our training will be handled in either weekday or weekends programme depends on participants requirement.

Short Term Course

ethical-hacking-institute

Ethical Hacking Course Outline

Ethical Hacking

hacking-course

Introduction To Ethical Hacking

  • What is hacking? And what is Ethical about it?
  • Types of Hackers.
  • The terminology of Hacking [Vulnerability, Exploit, 0-Day]
  • 5 Steps of Hacking [Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks]
  • Discussing Information Gathering [Active, Passive]
  • Information Gathering Practical [who.is, yougetsignal.com]
  • Google Hacking
  • Types of malicious files [virus, worm, rootkit etc]
  • Introduction to Kali/Linux OS
  • Social Engineering

Installation

  • According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali 1.1.0a/Backbox, Windows XP SP2
  • Install VMware, OSs on it using Bridge Connection
  • Completion of the Lab setup.

Explanation of the tools

  • Ping a Website to get IP Addon:-server spy, Passive recon, Flagfox, Ghostery, Cryptofox, Wapplazer (Mozilla Firefox), Tamper data
  • Network Scan, Port Scan, Service Scan, OS Fingerprint Scan [Nmap/Zenmap]
  • Network Vulnerability Scanning [Nessus/Open VAS]
  • Metasploit, SE Toolkit
  • Web Vulnerability Scanning [Acunetix/Zap]
  • SQL-Injection [Havij, Sqlmap]
  • Cryptography
  • Steganography

System Hacking

  • System Hacking using Kon-Boot, Live CD
  • Prevention of System Hacking
  • Types of Passwords
  • Password Cracking
  • Dictionary, brute force attack, Rule-Based attack
  • Keylogger, Spyware, Rootkits
  • Defending Keylogger, Spyware and Rootkits

Network Penetration Testing

  • Remote Administration Tool {RAT}
  • Scanning with NMAP
  • Installing of Nessus
  • Vulnerability Scanning using Nessus/Qualys Free Scan/ GFI Lan Guard
  • Metasploit
  • Set toolkit
  • Protect System from RAT
  • Protect System from Metasploit
  • What is Sniffing and what is the mechanism of Sniffing
  • How to use Wireshark and Cain and Able as a sniffer
  • What is netscan and how it works in Real-time and practical
  • Malware threats and prevention
  • Denial Of Service/ Distributed Denial Of Service
  • Session Hijacking
  • Hacking Wireless Network
  • MAC Spoofing
  • IP Spoofing
  • Tor Browser and VPN

Web Application Penetration

  • Web Application and its basics (Understanding HTML and its response and a website works)
  • OWASP Top 10 Vulnerability
  • SQL-Injection [Basic, Advance, Blind]
  • Practical of SQL-Injection using Havij/Sqlmap
  • Prevention of SQL-Injection
  • Cross Site Scripting and Its effect
  • Prevention of Cross-site scripting
  • Data-tampering on E-commerce Sites
  • Prevention of Data-tampering
  • Website Defacement and Prevention
  • E-mail hacking using phishing
  • Hacking Web Servers