Ethical Hacking

  • Last Update January 5, 2021

Description

Module 1:Introduction To Ethical Hacking

OverView

Who is hacker

Classification Of Hackers

Phases Of Hacking

Scope Of CyberSecurity

Module 2: Network Basics

Overview

 What is Network

IPv4 Addresses

MAC Addresses

The OSI Model

Diffrent Type Network Protocol

Three-Way Handshake

What is Port

Module 3: Setting Up Lab

Overview

Installing Kali Linux [Vbox /Vmware]

What is Purpose Of Kali Linux ?

Exploring Certain Neseccary Tools

Module 4: WebServer

Overview

What is Webserver ?

How the Web works ?

Setting Up WebServer.

Different Type protocols and http Methods.

 

 

Module 5:Reconnassiance & Scanning

Overview of Reconnassiance

What is Reconnassiance ?

Different Type Of Reconnassiance ?

What is the Purpose ?

Overview ofScanning

Nmap

Different Type Of Nmap Scanning

Module 6: Hacking Webserver

Overview

Identifying Webserver

Checking Webserver is Vulnerable

Exploiting Webserver

Writing Report

Module 7:Web Application Penetration Testing

Overview

Introduction

Setting Up Lab For WebApplicationPenetration Testing

Installing Burpsuite

Burp Basics: configuring Firefox to trust Burp certificate for man-in-the-middle.

Installing Foxy Proxy

The OWASP Top 10 & OWASP Testing Checklist

  1. Injection
  1. Broken Authentication and Session Management
  1. Sensitive Data Exposure
  1. XML External Entity
  1. Broken Access Control
  1. Security Misconfiguration
  1. Cross-Site Scripting
  1. Insecure deserialization
  1. Using Components With Known Vulnerabilities
  1. Insufficient Logging and Monitoring

Writing Report

Module 8:Social Engineering

Overview

                What is Social Engineering

                Relevance Of Social Engineering

                Human Based Social Engineering

                Computer Based Social Engineering

                Phishing

(Learn from international achievers)

18,000.00 6,000.00