ETHICAL HACKING

About the Course

A Quick Overview:
With the whole world going digital, the curve of cyber threats and cyber crimes has also seen an alarming ascent. Today when almost every one of us has their private information stored on a server or cloud somewhere, the need for trained individuals who know the ins and outs of these malpractices has never been higher. So we are proud to bring you our Ethical Hacking Program where you shall follow a practical hands-on approach and work on real-time networks and cybersecurity mechanisms as well as grasp the basic concepts of the field.

What student will learn

What-is-Cyber-Security

INTRODUCTION

  • Intro of Hacking
  • what is hacking ?
  • Types of hacker
    • Black hat
    • white hat 
    • grey hat
  • About teams
    • Red Team 
    • Blue Team

Virtualization

  • what is virtualization?
  • Download Virtual Box or Vmware & installation
  • setup and configure (Windows, Linux & Mac)
Footprinting_ Advanced Learning Course
product_28830_product_shots1

Linux

  • Basic of linux and History
  • Kali Linux commands
  • directories, myfile
  • vi, vim and nano editor
  • chmod, manipulation and packages
  • IP Addressing and netcat
  • copy commands

Networking

  • what is LAN, MAN and WAN ?
  • What is IP Address ?
  • IP Address Classes
  • what is MAC Address and CAM ?
  • Router, switch and hub ?
may3_large
5-01

IDS, IPS, Firewalls and Honeypot

  • firewall Statefull and stateless
  • what is Proxies servers ?
  • What is IPS and IDS ?
  • Honeypot

Information Gathering and scanning

  • Information Gathering
  • Infromation Gathering Intro
  • Passive and Active
  • Domain name services
  • google operators and shodan
  • what is ports and flags ?
  • ports scanning intro ?
  • scanning ports using nmap (tool)
  • bypass firewall with nmap and hping3 (tools)
agence-olloweb-d9ILr-dbEdg-unsplash-scaled
hack-your-own-wi-fi_neon-wi-fi_keyboard_hacker-100791531-large

Hacking Wireless Networks and Sniffing

  • Hack wireless network & sniffing
  • wifi Hacking
  • packet sniffing and MITM

Malware Threats

  • what is Malware and how many types of malware ?
  • how to make virus and spyware
photo-1560854350-13c0b47a3180
img_blog-ddos_attacks_how_to_prepare_data_foundry

Denial of Service

  • what is Denial of Service ?
  • how to perform dos attack ?
  • how many types of DOS Attacks?

Social Engineering

  • what is Social Engineering ?
  • how to do Attacks by using this technique and get information target machine ?
shutterstock_381063385-1024x671
Ransomware vs. Social Engineering

Hacking Web servers

  • Vulnerability Discovery/Scanning
  • Vulnerability Scanning Intro
  • Vulnerability Scanning Nmap scripting Engine
  • Vulnerability Scanning Metasploit
  • Exploitation Directory Traversal
  • cracking logging system
  • Using Backdoor to Access and FTP server
  • Exploitation SQL commands

Hacking Web Applications

  • intro web application
  • what is owasp top 10 ?
  • how to find out Vulnerable
  • what is sql injection
  • peform Attack manual & using sqlmap (tool)
  • Cross site scripting (XSS)
  • what is XSS ?
  • types of XSS
  • Perform Attack
2017-03-29-ransomware-attack
hacker-750_2

Hacking Mobile Platforms

  • Hack Android Phone
  • Understanding Android platform
  • make payload and install payload by using beef (tool)
  • MITM and social Engineering technique

Steganography

  • what is steganography ?
  • case study of steganography ?
  • how to use terrorist steganography for communication
dc-Cover-1oj9rg51ed3f5856h749ea2j63-20170807090358.Medi
how-hackers-may-be-hurting-your-seo-5e45656cd8c2e-1520x800

Cryptography

  • what is Cryptography ?
  • why using Cryptography for communication ?
  • How many types of Encryption ?

What student will get

24x7 Support

Round the clock administrative support regarding course, payments, technical issues, etc

Projects

Complete the course with 3 flawless projects

Materials

Access to LMS with free study material

Feedback

Instantaneous feedback with unlimited support from Trainer

Certificate

Course completion certificate

Revision

One free session for revision purpose

Pre-requisite

Course Type:

Certificate

Batch Size:

5 student

Training Location:

  • Offline: New Delhi
  • Online: Any (Preferred)

Exam:

Online Mode

Minimum System Configuration Required:

  • Intel i3 Processor
  • 4GB RAM
  • 2GB Graphic Card
  • 500GB/1 TB HDD
  • High Speed Internet (WI-FI)

Eligibility Criteria:

Knowledge of basic computer programming fundamentals, consistently meeting project deadlines and active participation is all we need

CERTIFICATE

Frequently Asked Questions(FAQ's)

There is no minimum age requirement for doing this course.

There is no minimum qualification required if the student meets the Eligibility Criteria.

Yes, all materials are available on our online LMS, you can access them anytime.

Yes, certificate (hardcopy/softcopy) will be provided after successfully completion of the course.

Courses are taught both in English and in Hindi. The student can choose his/her language of study.

This course is both for Professionals and Students.

Yes, there will be an exam after completion of the course and there will be around 3 major projects throughout the whole course duration.

It is recommended that the student carry his/her own Laptop because it makes their self-practice easier. In case of emergency laptop/desktop can be provided by us (Offline Training).

Yes, we do offer installment plans kindly check out the fees section.

Yes, absolutely! We provide special weekend classes for Working Professionals and we schedule classes in the Evening / Night also as per the convenience of the student (Online Classes).

Schools cannot guarantee you’ll have a job after you complete, and the same goes with this course. Our experts will help you in any way they can to point you toward job prospects and make even help you in getting a job.

If you still have questions about anything. Kindly, feel free to contact us on :

Phone :  (+91) – 8802413963

Email: info@skilligence.in