ETHICAL HACKING

Learn how to use Data Science with Python from beginner level to advanced techniques which are taught by experienced working professionals. With our Data Science with Python Training in Chennai, you'll learn concepts at an expert level in a practical manner. Get enrolled for the most demanding skill in the world.

ETHICAL HACKING Exams & Certification

...

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from and going word in classical literature, discovered the undoubtable source.

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin literature, discovered the undoubtable source.

SYLLABUS

  • What is hacking? And what is Ethical about it?
  • Types of Hackers.
  • The terminology of Hacking includes Vulnerability, Exploit, 0-Day
  • 5 Steps of Hacking like Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks
  • Discussing Information Gathering [Active, Passive]
  • Information Gathering Practical [who.is, yougetsignal.com]
  • Google Hacking
  • Types of malicious files like virus, worm, rootkit etc
  • Introduction to Kali/Linux OS
  • Social Engineering
  • According to the Laptop configuration, 32/64 bit, which provide VMware, and any Penetration testing OS like Kali 1.1.0a/Backbox, Windows XP SP2
  • Installation of VMware, OSs on it using Bridge Connection
  • Completion of the Lab setup.
  • Ping a Website for getting IP Addon:-server spy, Passive recon, Flagfox, Ghostery, Cryptofox, Wapplazer (Mozilla Firefox), Tamper data
  • Network Scan, Service Scan, Port Scan, OS Fingerprint Scan [Nmap/Zenmap]
  • Network Vulnerability Scanning [Nessus/Open VAS]
  • Metasploit, SE Toolkit
  • Web Vulnerability Scanning [Acunetix/Zap]
  • SQL-Injection [Havij, Sqlmap]
  • Cryptography
  • Steganography
  • System Hacking using Kon-Boot, Live CD
  • Prevention of System Hacking
  • Types of Passwords
  • Password Cracking
  • Dictionary, brute force attack, Rule-Based attack
  • Keylogger, Spyware, Rootkits
  • Defending Keylogger, Spyware and Rootkits
  • Remote Administration Tool {RAT}
  • Scanning with NMAP
  • Installing of Nessus
  • Vulnerability Scanning by using Nessus/Qualys Free Scan/ GFI Lan Guard
  • Metasploit
  • Set toolkit
  • Protect System from RAT
  • Protect System from Metasploit
  • What is Sniffing & explain its mechanism of Sniffing
  • How we can use the Wireshark and Cain and Able as a sniffer
  • What is netscan and how it actually works in Real-time and practical
  • Malware threats and prevention
  • Denial Of Service/ Distributed Denial Of Service
  • Session Hijacking
  • Hacking Wireless Network
  • MAC Spoofing
  • IP Spoofing
  • Tor Browser and VPN
  • Web Application and its basics (Understanding HTML and its response and a website works)
  • OWASP Top 10 Vulnerability
  • SQL-Injection [Basic, Advance, Blind]
  • Practical of SQL-Injection using Havij/Sqlmap
  • Prevention of SQL-Injection
  • Cross Site Scripting and Its effect
  • Prevention of Cross-site scripting
  • Data-tampering on E-commerce Sites
  • Prevention of Data-tampering
  • Website Defacement and Prevention
  • E-mail hacking using phishing
  • Hacking Web Servers

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.