Course Details
About this Course
In this Online Ethical Hacking Course you will learn from beginners to advanced level. You will start to learn from setting up lab so you can prepare your penetration testing lab at your home or office to practice and perform ethical hacking. First , you will learn how to install operating systems into virtualization like VMware.
In this course you will learn to perform Ethical Hacking or penetration testing step by step. You will learn to setup and configure hacking tools in your lab and then usage of it to perform most powerful attacks of hacking. In this course you will learn about penetration testing so instructor will demonstrate how you can perform hacking attack on your own devices in your computer network safely to find vulnerabilities of it and secure them.
This penetration testing course will brief you about computer network also. If you are already working as IT professional or System and network admin in IT industry, this course will help you a lot to secure computer computer network, operate computer network systems, designed computer network systems , monitor computer network systems.
This course will give you more confidence to work as ethical hacker or penetration tester in the live production environment.
This course is designed in a way you will learn from basic to advanced level.
In this course you will learn about most powerful hacking attacks like system hacking , password cracking , web server hacking , scanning networks , sniffing , DDos , web server hacking , web app hacking , enumeration , virus , Trojan , buffer overflow , SQL injection , firewall , ids , IPS , cryptography , wireless , session hijacking , mobile platform hacking , social engineering , Steganography , etc.
In this security course every attack performed in my own lab. This penetration testing course mainly focusing on practicals. This course will teach you step by step practicals that how you can penetrate your own computer networks and defend it from hacker's attack. This online penetration testing course will give you complete white hats skills.
This course is divided in phases like foot printing , scanning , gaining Access , maintaining and covering track.
We tried to make every practicals to be easy to understand however we are giving support to solve queries of students.
This ethical hacking course is designed for educational purpose only. We does not motivate anyone to launch attacks on internet or to your company's environment to damage other. We gives a tips and tricks that how attackers attack on network and how we can defend it by attacking on our own networks and devices. We use our own computer network systems to perform Ethical hacking that we have full permission to launch attack.
Basic knowledge
-
Basic Computer IT Skills
-
Computer With 4GB Of Ram Atleast (8GB Recommended)
-
Operating Systems - Windows , Linux , Kali Linux (We will teach you how you can install it)
-
Computer Network Knowledge Will Be Advantage
What you will learn
-
What is virtualization?
-
Ethical Hacking terms and ethics
-
Phases of hacking
-
Attack categories and vectors
-
Concepts of footprinting
-
Search engine tools
-
Hacking using google tool
-
Website recon tools
-
Metagoofil tool
-
Email headers and footprinting
-
DNS tool
-
WHOIS
-
Network scanning overview and methodology
-
Port discovery
-
Network scanning tools
-
Stealth idle scanning
-
OS and application fingerprinting
-
Vulnerability scanning
-
Network mapping tools
-
Proxy servers
-
Enumeration concepts
-
Netbios enumeration
-
SNMP enumeration
-
LDAP enumeration
-
NTP enumeration
-
SMTP enumeration
-
System Hacking concepts
-
Password cracking
-
Sniffing ( Man in the middle attack)
-
Rainbow crack
-
Password reset
-
DHCP starvation
-
Remote Access method
-
Spyware
-
NTFS alternate data stream exploit
-
Steganography
-
Covering track
-
Malware overview , malware analysis,
-
Trojan concepts , creating trojan
-
Virus
-
Switching security concepts and attack
-
DHCP snooping
-
ARP inspection
-
Social engineering
-
Denial of service attack
-
Session Hijacking
-
Hacking Web Servers
-
Buffer overflow
-
OWASP
-
SQL injection
-
Web app vulnerabilities
-
Wireless hacking concepts
-
Mobile Hacking
-
Firewall
-
IDS and IPS
-
Honeypots
-
Encryption concepts