Ethical Hacking
We are the best Ethical Hacking training course provider in Vasai. Start from the basic level but learn till a very advanced level in Ethical Hacking programming.
COURSE MODULE :
Training Schedule – Ethical Hacking Training Course |
|
---|---|
Module 1: Introduction |
Hacking Concepts. Ethical Hacking Concepts. Basic difference between Hacking & Ethical Hacking. Phases of Hacking. Types of Hacking & Types of Hacker’s. Types of OS in Cyber Security. |
Module 2: Getting Started with Kali Linux |
Downloading a Kali ISO Image. Where to Download. What to Download. Copying the Image on a DVD-ROM or USB Key. Creating a Bootable Kali USB Drive on Windows. Creating a Bootable Kali USB Drive on Linux. Creating a Bootable Kali USB Drive on OS X/macOS. Booting a Kali ISO Image in Live Mode. On a Real Computer. In a Virtual Machine. Virtual Box. VMware. Dual Booting. |
Module 3: Different OS Installation |
Parrot. Black arch. Sentuko. Black box. Garuda Linux. |
Module 4: The File System |
Filesystem Hierarchy /bin/ /boot/ /dev/ /etc/ /home/ /lib/ /media/ /mnt/ /opt/ /root/ /run/ /sbin/ /srv/ /tmp/ /usr/ /var/ /proc/ and /sys/ |
Module 5: OSINT(Open-source intelligence) |
Username. Email Address. Domain Name. IP Address Images, Videos, Docs. Social Networks. Instant Messaging. People Search Engines. Training. Documentation. OpSec. Threat Intelligence. Exploits & Advisories. Malicious File Analysis. Tools. Encoding and Decoding. Classifieds. Digital Currency. Dark Web. Terrorism. Mobile Emulation. Metadata. Language Translation. Archives. Forums, Blogs, IRC. Search Engines. Geolocation Tools / Maps. Transportation. Business Records. Public Records. Telephone Numbers. Dating. |
Module 6: Social Engineering |
Email Phishing. Vishing. Spear Phishing. Whaling. Social media phishing (Instagram, Facebook, etc..). |
Module 7: Pharming Attack |
What is Pharming Attack. Steps to avoid Pharming Attack. URL Crazy. Bits Flipping. Httrack website. Sublist 3r Master. Free domain booking tricks. |
Module 8: System Hacking |
System Hacking. Different Methods of system hacking. Security mesurments of system hacking. Payload creation. Payload hiding methods. Live example of system hacking and preacaution. |
COURSE MODULE :
Ethical Hacking Training Course |
|
Module 1: Introduction |
|
Module 2:Getting Started with Kali Linux |
|
Module 3: Different OS Installation |
|
Module 4:The File System |
|
Module 5: OSINT(Open-source intelligence) |
|
Module 6: Social Engineering |
|
Module 7: Pharming Attack |
|
Module 8:System Hacking |
|