ETHICAL HACKING

About this Course

Hacking has been a part of computing for almost five decades and it is a very broad discipline, which covers a wide range of topics. The first known event of hacking had taken place in 1960 at MIT and at the same time, the term “Hacker” was originated. In this tutorial, we will take you through the various concepts of Ethical Hacking and explain how you can use them in a real-time environment.

Audience

This course has been prepared for professionals aspiring to learn the basics of Ethical Hacking and make a career as an Ethical Hacker.

Prerequisites

Before proceeding with this course you should have a good overall the fundamental concepts of a computer and how it operates in a networked environment.

How Ethical Hackers can help Businesses

It’s easy to see how business can benefit from using ethical hackers. A while hat hacker can mimic a genuine cyber attack that black hat hackers would attempt to carry out using all the same strategies that a real attack would use. If a business’s defenses have a weakness, the ethical hacker will be able to expose it so that it can be fixed before a real hack occurs.  

Ethical Hacking Syllabus

1.ETHICAL HACKING - OVERVIEW

  • Types of Hacking
  • Advantages of Hacking
  • Disadvantages of Hacking
  • Purpose of Hacking

2.ETHICAL HACKING - HACKER TYPES

  •  White Hat Hackers
  • Black Hat Hackers
  • Grey Hat Hackers
  • Miscellaneous Hackers

3. ETHICAL HACKING - FAMOUS HACKERS

4. ETHICAL HACKING - TERMINOLOGIES

5. ETHICAL HACKING - TOOLS

6. ETHICAL HACKINH - SKILLS

  • Basic skills
  • Courses & Certifications

7. ETHICAL HACKING PROCESS

8. ETHICAL HACKING - RECONNAISSANCE

9. ETHICAL HACKING - FOOTPRINTING

  • Domain Name Information
  • Finding IP Address
  • Finding Hosting Company
  • IP Address Ranges
  • History of the Website 

10. ETHICAL HACKING - FINGERPRINTING

  • Basic Steps
  • Port Scanning
  • Ping Sweep
  • DNS Enumeration

11. ETHICAL HACKING - SNIFFING

  • Types of Sniffing
  • Hardware Protocol Analyzers
  • Lawful Interception

12. ETHICAL HACKING - SNIFFING TOOLS

13. ETHICAL HACKING - ARP POISONING

  • What is ARP Spoofing?
  • What is MITM?
  • ARP Poisoning

14. ETHICAL HACKING - DNS POISONING

  • DNS Poisoning – Exercise
  • Defenses against DNS Poisoning

15. ETHICAL HACKING - EXPLOITATION

16. ETHICAL HACKING - ENUMERATION

17. ETHICAL HACKING - METASPLOIT

  • Exploits of Metasploit
  • Metasploit Payloads

18. ETHICAL HACKING - TROJAN ATTACKS

19. ETHICAL HACKING - TCP/IP HIJACKING

20. ETHICAL HACKING - EMAIL HIJACKING

  • Email Spoofing
  • Social Engineering
  • Inserting Viruses in a System

21. ETHICAL HACKING - PASSWORD HACKING

  • Dictionary Attack
  • Hybrid Dictionary Attack
  • Brute – Force Attack
  • Rainbow Tables

22. ETHICAL HACKING - WIRELESS HACKING

  • Kismet
  • NetStumbler
  • Wired Equivalent Privacy
  • Wireless DoS Attacks

23. ETHICAL HACKING - SOCIAL ENGINEERING

24. ETHICAL HACKING - DDoS ATTACKS

  • What are Botnets?
  • Types of DDoS Attacks

25. ETHICAL HACKING - CROSS-SITE SCRIPTING

26. ETHICAL HACKING - SQL INJECTION

27. ETHICAL HACKING - PEN TESTING