Ethical Hacking
Pre-requisite: : Networking Knowledge, Or Basic Knowledge in Computers.
In this course you will learn how to find critical information that helps you to hack into computer / applications, later tool, techniques and technologies that help you to penetrate (hack) into your target- Ethical Hackers have high demand and have excellent job scope around the world- You can just dig information in job portals about the job scope and salaries paid- According to Nasscom (INDIA), India needs 188,000 security professionals by 2012, its 2014 now, you can expect the job scope around the world
SYLLABUS
- Introduction to Ethical Hacking.
- Hands on Linux / Ubuntu.
- Hands on Windows Command Line tools.
- Protocols.
- Internet Governance.
- Reconnaissance.
- Google Hacking.
- Scanning.
- Enumeration.
- System Hacking.
- Proxies Servers.
- Key loggers.
- Trojans and Backdoors.
- Viruses and Worms.
- Sniffing.
- Social Engineering.
- Email Hacking
- Hacking Routers.
- Session Hijacking.
- Hacking Web servers.
- SQL Injection.
- XSS Attacks (Cross-site Scripting).
- CSRF Attacks (Cross-site Request Forgery).
- DOS and DDOS attack
- RFI and LFI.
- Buffer Overflows.
- Reverse Engineering.
- Cryptography.
- Firewalls.
- Physical Security.
- Wireless Hacking.
- Metasploit.
- Mobile Hacking.
- Web Application Penetration Testing
- WAPT- Basics/Introduction
- WAPT- OWASP TOP 10
Our distinct services include :
- Material and Documents: We provide real time working documents and materials to our students.
- Free System Access : We have the latest and most up to date platforms deployed on high-end servers that are available remotely and in-class on a 24/7 basis.
- Interview Preparation: We will prepare you for interviews in your specialized area by providing some real time interview questions. We also conduct mock interviews and assist you in preparing a professional resume.
- Placement Assistance: Our placement service division provides job placement support by submitting your resumes to prospective clients and emails you any new job opportunities in the market. However, we do not provide false guarantees on securing any jobs for you. We have a history of several ex-students who have secured excellent jobs based on our WORLD class training approach, implementation of case study projects and post training support.
- Initial Job Stabilization Support: We support our students to get stabilized in their job in the first TWO months. If our students come across any issues, we are there to help them. Students can send an email to us with their issues, our experts will reply back with possible solutions within 24 hours.
- Free Class Room sessions recording: In addition to the e-class training, we will give you authorization to record all of your e-class room training sessions, so that you can go back and review.
Other Courses related
Course registration
Key Points of Training Program :
-
The technique of identifying the possible or potential threats on a computer or network of systems by a company or an individual is said to be Ethical hacking. It is used to look for any weak points that can be exploited by malicious hackers, on an attempt to bypass the system security. Therefore the obtained information is utilized by the organization to improve the system security.
-
1. In order to detect any potential security risks by means of hacking, an approval is
required by an individual or an organization.
2. The privacy of an individual or an organization should be treated with respect
3. No information should be taken for the sake of the hacker or any other sources who try to exploit it for their cause
4. The security concerns that deals with any software of hardware should be
intimated to the respective authorities of an organization
-
• The vulnerabilities of a system is found before an attacker tries to get it, which helps for the better development of security of an organization
• The method of ethical hacking uses the real tools, technologies and methodologies and approaches that create a huge difference between the ethical hacking and network security
• Ethical hacking finds the weakness in case of defending and documenting defenses, thus recognizing the weaknesses, documenting those weaknesses followed by setting them back in to the network security process which in turn makes it vulnerable to future potential attacks by defending against them