Ethical Hacking 1.0
With more than 8 years of experience in this field, we have derived a “PROVEN ROADMAP” that has helped thousands of beginners like you to become a successful Ethical Hacker.
- 4.80+ Ratings
- English
Course Overview
Ethical Hacking 1.0, specially designed with PRACTICAL Demonstrations is a perfect kick- starter course for every “WannaBe” Hacker to launch a career in Ethical Hacking and Cyber Security.
This course will begin from basics of Ethical Hacking & Cyber Security moving further to Networking Concepts, Web Application Vulnerability and Security, Social Engineering Techniques, about malwares, Cyber Forensics and some other topics to get clarity about modules available in cyber security.
We will also learn practically during this course and at the end you will be appreciated with completion certificate.
Salient Features
- Fundamentals of Cyber Security & Ethical Hacking
- Setting up a Penetration Testing Lab
- Methods and techniques starting from Information Gathering to Clearing Traces
- Understanding Web Application Vulnerability & Security
- Limited time access to unveil potential within you regarding your career
- Dedicated Support Team to get your doubts and queries solved
- eSecurify Community Access to stay updated in Cyber Security
- Appreciated with participation certificate
Exciting Bonus
- Private Bug Bounty Website to maximize your chance of earning your life’s first bounty
- Bug Bounty Report Templates (present the way how it should be)
Curriculum
- Understanding Cyber Security & Ethical Hacking
- What is Cyber Crime?
- Ethical Way & Unethical Way
- What is Hacking?
- Attack Scenario
- Types of Hackers
- Phases of Ethical Hacking
- What is Network?
- What is Computer Network?
- Why do we Network?
- Networking Terminologies
- Node/Host
- Data Transfer Rate
- Client Server Interaction
- File Server & Web Server
- Types of Networks
- Local Area Network (LAN) & Network Topologies
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN)
- IP Address
- What is IP Address
- Versions of IP Address
- Understanding IPv4
- Brief about IPv6
- Types of IP Addressing – Static & Dynamic
- Classes of IP Address
- IP Categories – Private IP Address & Public IP Address
- Network Address Translation (NAT)
- Domain Name System (DNS)
- What are Ports?
- Common Ports
- Understanding WHOIS Database
- Hiding the Identity
- Understanding Proxy
- Disadvantages of Proxy
- Understanding VPN
- Site Mirroring
- Information Gathering Using Shodan
- Real-time Recorded Demonstrations on Information Gathering
- What are Google Dorks?
- List of Key Google Dorks
- Working of Google Dorks
- Port Scanning
- Port Scanners
- Scanning Techniques
- Power of Scanning
- Nmap – A Network Scanning Tool
- Understanding Metasploitable
- Understanding Metasploit
- Metasploit Commands
- Network or System Hacking Using Nmap, Metasploit & Metasploitable
- Understanding OSI Model
- Understanding TCP/IP Model
- Comparison: OSI & TCP/IP Model
- What is SQL Injection?
- Usual Scenario of SQL Request
- Attack Scenario of SQL Request
- Impact of SQL Injection
- What is Authentication?
- How does authentication work?
- What is SQL?
- Basics of SQL Query
- Understanding Logic Gates
- Bypassing Authentication
- Authentication Bypass Cheatsheet
- Remedy to Authentication Bypass
- Introduction to MySQL
- Steps to MySQL Injection
- Real-time Recorded Demonstration of MySQL Injection
- Automating SQL Injection Using SQLmap
- Introduction to HTML
- Introduction to JavaScript
- Introduction to XSS
- Working of XSS
- Types of XSS
- Real-time Recorded Demonstrations of XSS
- XSS Cheatsheet
- Using Google Dorks to Find XSS
- Impact of XSS
- Cookie Grabbing Using XSS
- Ways to Prevent XSS
- Social Engineering
- Phishing & its Types
- Vishing
- Safety Awareness Against Phishing & Vishing
- Uploading Shell or Backdoor on server
- Arbitrary File Upload
- Practical Working of Arbitrary File Upload
- Malwares – Virus, Worms, Trojans, etc.
- What is Malware?
- What is Virus?
- What are Worms?
- What is Trojan?
- Purpose of Trojan
- Remote Administration Tool (RAT)
- Remote Access Using Trojan
- What are the Traces?
- Deleting Server & System Logs
- Detecting Backdoors & Trojans
- Email Tracing
- Android Hacking
- Creating Android RAT
- Remote Access of Android Phone Using Malicious RAT
- Introduction to Wireless Technologies
- Wireless Encryption
- Real-time Recorded Demonstration
- Course Complication Certificate
Prerequisites
- Keen interest in learning Cyber Security
- Basic Understanding of Computer Operations and Internet
- PC/Laptop to practice