Ethical Hacking Training

Ethical Hacking Training by Qtree Technologies Training Institute in Coimbatore

Beginner 0(0 Ratings) 0 Students enrolled
Created by Qtree Technologies staff Last updated Tue, 12-Apr-2022 English


Ethical Hacking Training free videos and free material uploaded by Qtree Technologies staff .

Syllabus / What will i learn?

Introduction To Ethical Hacking

 What is hacking? And what is Ethical about it?

 Types of Hackers.

 Terminology of Hacking [Vulnerability, Exploit, 0-Day]

 5 Steps of Hacking [Information Gathering, Scanning, Gaining Access, Maintaining Access, Covering Tracks]

 Discussing about Information Gathering [Active, Passive]

 Information Gathering Practical [who.is, yougetsignal.com]

 Google Hacking

 Types of malicious files [virus, worm, rootkit etc]

 Introduction to Kali/Linux OS

 Social Engineering

Installation

 According to the configuration of Laptop, 32/64 bit, provide VMware, and any Penetration testing OS like Kali 1.1.0a/Backbox, Windows XP SP2

 Install VMware, OSs on it using Bridge Connection

 Completion of the Lab setup. Explanation of the tools

 Ping a Website to get IP

 Addon:-server spy, Passive recon, Flagfox, Ghostery, Cryptofox, Wapplazer (Mozilla Firefox), Tamper data ii) Network Scan, Port Scan, Service Scan, OS Fingerprint Scan [Nmap/Zenmap]

 Network Vulnerability Scanning [Nessus/Open VAS]

 Metasploit, SE Toolkit

 Web Vulnerability Scanning [Acunetix/Zap]

 Sql-Injection [Havij, Sqlmap]

 Cryptography

 Steganography System Hacking

System Hacking using Kon-Boot, Live CD

 Prevention of System Hacking

 Types of Passwords

 Password Cracking

 Dictionary, brute force attack, Rule Based attack

 Keylogger, Spyware, Rootkits

 Defending Keylogger, Spyware and Rootkits

Network Penetration Testing

 Remote Administration Tool {RAT}

 Scanning with NMAP

 Installing of Nessus

 Vulnerability Scanning using Nessus/Qualys Free Scan/ GFI Lan Guard

 Metasploit

 Set toolkit

 Protect System from RAT

 Protect System from Metasploit

 What is Sniffing and what is the mechanism of Sniffing

 How to use Wireshark and Cain and Able as a sniffer

 What is netscan and how it works. Real time practical

 Malware threats and prevention

 Denial Of Service/ Distributed Denial Of Service

 Session Hijacking

 Hacking Wireless Network

 MAC Spoofing

 IP Spoofing

 Tor Browser and VPN

Web Application Penetration

Web Application and its basics (Understanding HTML and its response and a website works)

 OWASP Top 10 Vulnerability

 Sql-Injection [Basic, Advance, Blind]

 Practical of Sql-Injection using Havij/Sqlmap

 Prevention of Sql-Injection

 Cross Site Scripting and Its effect

 Prevention of Cross-site scripting

 Data-tampering on E-commerce Sites

 Prevention of Data-tampering

 Website Defacement and Prevention

 E-mail hacking using phishing

 Hacking Web Servers Cyber Law in India in depth analysis

Course Agenda in Session Order

Footprinting (Reconnaissance-Passive)

Types of Footprinting

Footprinting Tools and countermeasures

Enumeration (Reconnaissance - Active)

Enumeration Techniques

Enumeration Countermeasures

Network Scanning

Network Scanning Technique

Network Scanning Countermeasures

System Hacking Methodology

System Hacking Methodology

Steganography

Ste analysis Attacks

Covering Tracks

Malware Threats

Types of Trojans

Trojan Analysis

Trojan countermeasures

Virus and Worms

Working Of Viruses

Virus Analysis

Computer Worms

Malware

Analysis Procedure and Countermeasures

Sniffing

Packet Sniffing Techniques

How to defend against sniffing?

Denial of Service

DoS/DDoS Attack Techniques

Botnets

DDoS Attack Tools

DoS/DDoS Countermeasures

Session Hijacking Techniques

Session Hijacking Techniques

Session Hijacking Countermeasures

Servers Attacks - Web Server, File Server

Different Types of Webserver Attacks

Attack Methodology and Countermeasures

Cryptography

Different Types Of Web Application Attacks

Web Application

Hacking Methodology and Countermeasures

SQL Injection Attacks

SQL Injection Attacks

Injection Detection Tools

Wireless Networks Attacks

Wireless Encryption

Wireless Cracking Methodology

Wireless Cracking Tools

Wireless Security Tools

IDS, IPS, Firewalls and Honeypots

Firewall

Intrusion Detection System (IDS)

Honeypot Evasion Techniques

Evasion Tools

Countermeasures

Cloud Computing Techniques

Various Cloud Computing Concepts

Cloud Computing Threats

Cloud Computing Attacks

Security Techniques and Tools

Cryptography

Different Types Of Cryptography Ciphers

Public Key Infrastructure (PKI)

Cryptography Attacks

Cryptanalysis Tools

Social Engineering

Social Engineering Techniques

Identify Theft

Social Engineering Countermeasures

Vulnerability Assessment and Penetration Testing

Various types of penetration testing

Penetration Testing Roadmap

Security Audit

Vulnerability Assessment

Ethical Hacking As a Career In detailed discussion on Information Security Industry growth and its present career opportunities

Cyber Law in India in depth analysis



Curriculum for this course
0 Lessons 00:00:00 Hours
+ View more
Description

Ethical Hacking Training in Coimbatore - Qtree training certifies the skills of an ethical hacker to protect against the flaws and vulnerabilities of network infrastructure and illegal hacking. Qtree Technologies is the No.1 and Best Ethical Hacking training institute in Coimbatore. Now, it is possible to discover Certified Ethical Hackers working with a number of the best and biggest companies across industries such as health care, financial, government, energy and a lot more!

You need online training / explanation for this course?

1 to 1 Online Training contact instructor for demo :


+ View more

Other related courses
About the instructor
  • 0 Reviews
  • 0 Students
  • 78 Courses
Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews

Material price :

Free

1:1 Online Training Fee: 10000 /-
Contact instructor for demo :