Home

Learn Ethical Hacking

What is ethical hacking?

Course Overview

MODULE 1: INTRO TO HACKING

It covers basics of ethical hacking, its terminolgy and its importance in cyber security world. It is the base of ethical hacking course.

MODULE 2: NETWORKING CONCEPTS

In this module, we will cover up different types of network topologies, network devices, protocols, IP address, VPN Networks etc.

MODULE 3: LAB SETUP

In this module of ethical hacking, we will cover up setting up of Labs, creating networks and different types of programs.

MODULE 4: KALI LINUX

In this module, we will cover installation of kali linux, network configuration and essential commands of Kali Linux.

MODULE 5: RECONNAISSANCE

It covers gathering of information of victim, IP Mapping, active and passive modes and detecting web servers and their locations etc.

MODULE 6: SCANNING

In this module we will tell you how to detect IP address, how to scan ports, MAC addres scanning, aggresive detection etc.

MODULE 7: ENUMERATION

It covers hacking techniques such as extracting email databases, brute force attack, extracting usernames using SNMP etc.

MODULE 8: DEEPWEB

DICC is specialized in imparting quality stock market training in Technical analysis, Fundamental Analysis, Derivative analysis, Option Analysis. We are also have expertise in providing training for NSE, NISM, and SEBI examination and help the students to get certifications.

MODULE 9: SYSTEM HACKING

The module will include password cracking methods for windows, Apple MAC OS, remote exploitation with Metasploit, etc.

MODULE 10: MOBILE HACKING

The course will include Call forging techniques, Call Tracking Techniques, SMS Tracking Techinques and so on.

MODULE 11: VIRUS AND WORMS

The course will include malware analysis fundamentals, malicious code analysis, In-depth Malware analysis, Self-defending Malwares etc.

MODULE 12: TROJANS & PAYLOADS

Using Trojans, RATS Hackers can completely control your computers and can infecting files, installing keyloggers, remotely starts web cams etc

MODULE 13: SNIFFING

In this module we will cover monitor or read all the network traffic that is passing through Telnet, FTP, NNTP, SMTP, HTTP or IMAP

MODULE 14: PHISHING

Learn in this module as how to use a fake page which looks like the original one and thus how you can get username and passwords.

MODULE 15: DDOS ATTACK

DOS methods used by Hackers to completely control the internet system by flooding the incoming traffic to the website from different resources.

MODULE 16: OWASP TOP 10

DICC is specialized in imparting quality stock market training in Technical analysis, Fundamental Analysis, Derivative analysis, Option Analysis. We are also have expertise in providing training for NSE, NISM, and SEBI examination and help the students to get certifications

MODULE 17: WI-FI HACKING

In this module we are offering wifi hacking training whereby you can easily be able to learn as how to crack WEP/WPA/WPA2 encryptions .

MODULE 18: CTFS

In this module, you will be learning about different CTF Challenges and we will also help to troubleshoot those CTF Challenges practicaly.

Intermediate to Advance Level..

Course Modules

  • Information Warfare
  • Careers in Ethical Hacking
  • Advantages and Limitations of Cyber Security
  • Cyber Defense
  • Skills of an Ethical Hacker
  • Information Security Policies
  • Vulnerability Research
  • Introduction to Penetration Testing
  • Phases of Penetration Testing
  • Ethical Hacking Laws and Policies
  • IT Act 200000
  • Risk Management and Methodology
  • Installating and Configuring DVWA11:43
  • Installating and Configuring bWAPP11:43
  • Installing Metasploitable on VM11:43
  • Installing OWASP Broken Web Application on VMWare11:43
  • How to Work Partiotion
  • File System
  • How to Work Shell
  • Type of Shell
  • NTFS vs FAT vs EXT
  • Linux User Administration
  • How to Overwrite Path Variable
  • How to Bypass Linux Password
  • How to Overwrite Configration File
  • How to Write Bash Script
  • Some Usefull Bash Script Commands
  • How to Work Router
  • How to Access Router Using Gateway
  • How to Bypass Default Things
  • How to Use Shodan
  • How to Work Vlan
  • How to Work Supernating
  • How to Work Vlan
  • Why Require Ip Version 6
  • Competitive Intelligence
  • Introduction to DNS Footprinting
  • DNS Resource Records
  • DNS Footprinting with DNS Dumpster
  • DNS.google.com
  • Introduction to Maltego
  • Maltego Information Gathering with domain name
  • Maltego Information Gathering with IP Address
  • Maltego Using the Tool Efficiently
  • Maltego Tranform Hub
  • Maltego Integration with Shodan
  • Shodan Introduction and First Look
  • OSINT Framework
  • The Harvester
  • Shodan Advanced Search with Dorks
  • Website Mirroring with httrack
  • Major IP Block
  • Types of Port Scanning – TCP Inverse Flag Scanning1
  • Types of Port Scanning – TCP Xmas Scan
  • Types of Port Scanning – ACK Flag Probe Scanning
  • Types of Port Scanning – UDP Scan Nmap – Bypass Firewalls and IDS
  • Port Scanning With Pentest-Tools
  • Evading IDS and Firewalls
  • Nmap Scripting Engine
  • OpenVas Installation and Configuration
  • Vulnerability Scanning with OpenVas
  • Mapping Networks
  • Network Topology Mapper
  • Spiceworks Network Mapper
  • Scanning Countermeasures
  • DNS Enumeration
  • Nslookup tool
  • DNS Zone Transfer using nslookup
  • Dig command
  • Enumeration Countermeasures
  • Lesson 03 - Escalating Privileges
  • Vertical Escalating Privileges
  • Horizental Escalating Privileges
  • Window 10 Hack Using pdf,docx,excel file
  • Online Malware Attack
  • Hash Injection or Pass the Hash
  • Meaning of Promiscous Mode
  • Man in the Middle and Replay attacks
  • Offline attacks, Rainbow Table
  • Offline Distributed Network Attacks
  • Password Cracking with KeyLoggers
  • Password Cracking with rainbowcrack
  • Password Cracking with Cain and Winrtgen
  • Password Salting
  • How password are stored in SAM file
  • NTLM Authen
  • Introduction to Metasploit
  • Metasploit Framework (msf) Walkthrough
  • Searchsploit
  • Metasploit Exploiting Windows
  • Introduction to Privilege Escalation
  • Types of Keyloggers
  • Introduction to Spywares
  • Hiding files – Rootkits
  • Stages of a Virus Lifetime
  • Phases of a Virus
  • Working of Viruses
  • Introduction to Sniffing
  • How Sniffing Works
  • Types of Sniffing
  • Introduction to Wireshark and Walkthrough
  • Wireshark Capturing Sensitive Data and Other Uses
  • Introduction to Session Hijacking
  • Session Hijacking Process
  • Introduction to Web Servers
  • Types of Web Servers
  • Web Server Security Stack
  • Why Web Servers are Compromised
  • Web Server Attack Methods13:31
  • Directory Traversal Attack
  • Directory Listing Attack
  • Website Defacement
  • Web Server Misconfiguration
  • HTTP Response Splitting or CRLF Injection
  • Web Cache Poisoning Attack
  • SSH and Password Cracking
  • Directory Traversal in action
  • Directory Traversal Portswigger
  • HTTP Splitting Webgoat
  • HTTP Response Splitting bWAPP
  • Countermeasures and Patch Management
  • Countermeasures 29:43
  • Countermeasures 3
  • OS Injection Advance
  • Xss dom advance
  • Xss Reflect advance
  • Xss Store advance
  • Sql Injection advance
  • Burp suite how to configure
  • Burp suit set proxy
  • How to intercept in burpsuit
  • Scanner tab in burpsuit
  • Repeater tab in burpsuit
  • Intruder tab in burpsuit
  • Scanner tab in burpsuit
  • Sequencer tab in burpsuit
  • Decoder tab in burpsuit
  • Comparer tab in burpsuit
  • External extention how work
  • Advance sql injection
  • How to work sql map
  • Dvwa platform
  • Bwapp platform
  • Portswiger platform
  • Introduction to Firewall concepts
  • Firewall Architecture
  • Types Of Firewalls

Share this Page!