Home

Learn Ethical Hacking

What is ethical hacking?

Course Overview

MODULE 1: INTRO TO HACKING

It covers basics of ethical hacking, its terminolgy and its importance in cyber security world. It is the base of ethical hacking course.

MODULE 2: NETWORKING CONCEPTS

In this module, we will cover up different types of network topologies, network devices, protocols, IP address, VPN Networks etc.

MODULE 3: LAB SETUP

In this module of ethical hacking, we will cover up setting up of Labs, creating networks and different types of programs.

MODULE 4: KALI LINUX

In this module, we will cover installation of kali linux, network configuration and essential commands of Kali Linux.

MODULE 5: RECONNAISSANCE

It covers gathering of information of victim, IP Mapping, active and passive modes and detecting web servers and their locations etc.

MODULE 6: SCANNING

In this module we will tell you how to detect IP address, how to scan ports, MAC addres scanning, aggresive detection etc.

MODULE 7: ENUMERATION

It covers hacking techniques such as extracting email databases, brute force attack, extracting usernames using SNMP etc.

MODULE 8: DEEPWEB

DICC is specialized in imparting quality stock market training in Technical analysis, Fundamental Analysis, Derivative analysis, Option Analysis. We are also have expertise in providing training for NSE, NISM, and SEBI examination and help the students to get certifications.

MODULE 9: SYSTEM HACKING

The module will include password cracking methods for windows, Apple MAC OS, remote exploitation with Metasploit, etc.

MODULE 10: MOBILE HACKING

The course will include Call forging techniques, Call Tracking Techniques, SMS Tracking Techinques and so on.

MODULE 11: VIRUS AND WORMS

The course will include malware analysis fundamentals, malicious code analysis, In-depth Malware analysis, Self-defending Malwares etc.

MODULE 12: TROJANS & PAYLOADS

Using Trojans, RATS Hackers can completely control your computers and can infecting files, installing keyloggers, remotely starts web cams etc

MODULE 13: SNIFFING

In this module we will cover monitor or read all the network traffic that is passing through Telnet, FTP, NNTP, SMTP, HTTP or IMAP

MODULE 14: PHISHING

Learn in this module as how to use a fake page which looks like the original one and thus how you can get username and passwords.

MODULE 15: DDOS ATTACK

DOS methods used by Hackers to completely control the internet system by flooding the incoming traffic to the website from different resources.

MODULE 16: OWASP TOP 10

DICC is specialized in imparting quality stock market training in Technical analysis, Fundamental Analysis, Derivative analysis, Option Analysis. We are also have expertise in providing training for NSE, NISM, and SEBI examination and help the students to get certifications

MODULE 17: WI-FI HACKING

In this module we are offering wifi hacking training whereby you can easily be able to learn as how to crack WEP/WPA/WPA2 encryptions .

MODULE 18: CTFS

In this module, you will be learning about different CTF Challenges and we will also help to troubleshoot those CTF Challenges practicaly.

Beginner to Intermediate Level..

Course Modules

  • Introduction to Information Security
  • Information-Security-Threats
  • Introduction to Cyber Security
  • The CIA Triad
  • Who are Ha Types of Hackers
  • Introduction to Ethical Hacking
  • Need for Ethical Ha1 Course OveGeneral Terminolog1 How To become an Ethical Hacker
  • Introduction to OS Linux and it’s Evolution
  • Major Linux Distributions
  • Advantages of linux
  • Linux for Penetration Testing
  • Types of Hackers contd
  • Phases of Ethical Hacking
  • Cyber Security vs Ethical Hacking
  • Software and Hardware Requirements for a Hacking Lab
  • Installing and Configuring VMWare
  • Dual boot vs Virtual Machine
  • Choosing and Downloading Kali Distro
  • Configuring VM For Kali Linux
  • Installing Kali Linux 2019.4 on VMWare
  • Virtual Network Configurations Explained – NAT vs Bridged vs Host Only vs Internal
  • Introduction to Command Line
  • Windows command line
  • Linux command line
  • Linux File System
  • NTFS vs FAT vs EXT
  • Linux User Administration
  • Kali 2019.4 and linux file system overview
  • Linux Elementary Commands
  • Linux Networking Commands
  • History and grep command
  • Working with Linux User Administration
  • Linux Working with Files, Permissions and Directories
  • Working with Linux File Permissions
  • Linux Working with Groups
  • Linux Package Manager apt
  • Linux Useful Files
  • The OSI Model – Open Systems Interconnection
  • More on OSI Model – Introduction to TCP-IP Model
  • TCP-IP v-s OSI – The Difference
  • Data Link Layer and MAC Addresses
  • Network Layer and IP Addresses
  • Classful IP Addressing, Private and Special Addresses
  • Classless IP Addressing
  • Transport Layer
  • Ports and Port Addressing
  • Proxies and Proxy Servers
  • Introduction to TOR
  • Introduction to VPN
  • Remote Login – SSH and telnet
  • Introduction to NAT and Port Forwarding
  • Introduction to Footprinting and Objectives
  • Footprinting through search Engines
  • Introduction to OSINT
  • Email Footprinting
  • Website Footprinting
  • Internet Archive
  • wget Mirroring
  • whois lookup
  • Network Footprinting
  • Introduction and Working of Traceroute
  • Traceroute Analysis
  • Shodan Introduction and First Look
  • WhatWeb
  • Wappalyzer
  • sublist3r
  • Subdomain Finder Websites
  • netdiscover
  • Google Dorks Explained – What is Google Hacking
  • Working with Google Dorks – Google Dorking Practical
  • Footprinting with Social Engineering
  • Footprinting Countermeasures
  • Basics of Scanning
  • Scanning Methodology
  • Working with ping command for live hosts
  • Angry IP Scanner
  • TCP Flags
  • TCP 3-Way Handshake
  • Introduction to Port Scanning
  • Port Scanning Methodology
  • Types of Port Scanning – TCP Connect Scan
  • Types of Port Scanning – TCP Stealth Scan
  • Introduction to Nmap and First Look
  • Nmap – Port Scanning
  • Nmap – Advanced Port Scanning
  • Nmap – Types of Scans
  • Port Scanning with hping
  • Introduction to Banner Grabbing
  • Banner Grabbing with ID Serve
  • Banner Grabbing with NetCraft
  • Banner Grabbing with netcat
  • Scanning for Vulnerabilities
  • Nessus Vulnerability Scanner
  • nikto Web Vulnerability Scanner
  • WordPress Vulnerability Scanning with wpscan
  • Introduction to Enumeration
  • Techniques of Enumeration
  • NetBIOS enumeration
  • SMB Enumeration
  • Working wiith NetBIOS and SMB Enumeration
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Hashing
  • Url Encryption
  • Encoding and Decoding
  • Cryptography Concepts
  • stenography types
  • Text Steganography
  • Image Steganography
  • Video Steganography
  • Audio Steganography
  • Stenography Tools
  • what is Vulnerbilty Analysis
  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • System Hacking Concepts
  • Cracking Passwords
  • Executing Applications
  • Hiding Files
  • Win xp
  • Windows 7
  • Windows 10
  • Introduction to System Hacking
  • Goals of System Hacking
  • Introduction to Password Cracking
  • Password Complexity
  • Types of Password Attacks
  • Active Online Attack
  • Password Guessing
  • Default Passwords
  • Online Malware Attack
  • Password List generation with crunch
  • Password Cracking with hashcat
  • Password Cracking with John the Ripper
  • Facebook Hacking
  • Instagram Hacking
  • Tewiter Hacking
  • Gmail Hacking
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • os injection
  • xss dom
  • xss Reflect
  • xss Store
  • Sql injection
  • Introduction to Sniffing
  • How Sniffing Works
  • Types of Sniffing
  • Introduction to Firewall concepts
  • Firewall Architecture
  • Types Of Firewalls
  • Introduction to IDS and IPS
  • IDS Detection Techniques
  • How to use practically firewall
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • wpa and wps and wpa2 password cracking
  • wifi cloning
  • Ap cloning
  • wifi Jamming

Share this Page!