• Instructor: Mike Hussy
  • Students: 7836
  • Duration: 10 weeks

Ethical hacking refers to the demonstration of finding the shortcoming and vulnerabilities of the PC and Information system. This can be done by copying the activity and motivation of the moral programmer. This ethical hacking is otherwise called as penetration testing (or) intrusion testing (or) red teaming.

An ethical hacker is a PC and systems administration master who unknowingly penetrate the system . This will be done for the benefit of the client to find the security vulnerabilities. Ethical hackers use some methods and techniques to test and bypass system defenses. But it takes the advantage of any vulnerabilities found and document them. This document helps to provide a actionable advice on how to fix them.

The purpose of ethical hacking is to the secure the network (or) system infrastructure. It helps in finding whether any unauthorized access is possible through it. These errors tend to be in the poor and improper configuration of the system. An ethical hacker is sometimes called a legal white hat hacker.

After the completion of the course, you can do the certification that conducts a penetration test. This includes :

CREST

MILE2

SANS –Institute

EC- Council

This ethical hacking helps you to make your system safe from the Cyber attacks.

  1. What is hacking
  2. Difference between ethical and unethical hacking

Types of Hackers

  1. Black hat
  2. white hat
  1. newbie
  2. script kiddies, etc.
  1. Cyber Laws and Restrictions
    1. Computer Misuse Act
    2. Data Protection Act
  1. What is Linux Kali, LAMP and VMWare
    1. Introduction to Linux
    2. Introduction to LAMP Server
  1. troduction to hypervisor and VMWare
  2. What is Linux Kali and why is it so famous?
  1. Understanding and using Linux
    1. Installing VMWare
    2. Installing Linux Kali
  1. Basics about Linux Kali
  1. Understanding Network, IP and Websites
    1. Introduction to networking
    2. Private IP and Public IP
  1. How are websites hosted
  1. All about bWAPP and DVWA
    1. What are deliberately vulnerable web apps
    2. What is bWAPP and DVWA

Reconnaissance

  1. What is reconnaissance
  2. Why is it important

Nmap

  1. Network mapping
  2. Types of nmap scans

OSINT (Open-Source INTelligence)

  1. What is OSINT?
  2. Why is OSINT used?
  1. Reconnaissance Tools
    1. Introduction to other recon tools
  1. SQLI (Manual & Automated)
    1. What is SQLI
    2. Manual SQLI

XSS (Manual & Automated)

  1. What is XSS
  2. Manual XSS

XSRF (Manual & Automated)

  1. What is XSRF
  2. Manual XSRF
  1. Directory Traversal
    1. Introduction to directory traversal
    2. Use of directory traversal
  1. Using BurpSuite and OWASP ZAP
    1. What is the use of intercept tools
    2. Comparing BurpSuite and OWASP ZAP

Finding tools on GitHub

  1. What is GitHub
  2. Why is open-source community so important

Exploring other hacking playgrounds

  1. What are hacking playgrounds
  2. Where to find them

Curriculum is empty

Price

Free
Call Now ButtonCall NowRequest Form