Subcribe and Access : 5200+ FREE Videos and 21+ Subjects Like CRT, SoftSkills, JAVA, Hadoop, Microsoft .NET, Testing Tools etc..
Batch
Date: Feb
25th @7:00PM
Faculty: Mr. Shoaib Ahmed
Duration: 45 Days
Venue
:
DURGA SOFTWARE SOLUTIONS,
Flat No : 202,
2nd Floor,
HUDA Maitrivanam,
Ameerpet, Hyderabad - 500038
Ph.No: +91 - 8885252627, 9246212143, 80 96 96 96 96
Syllabus:
Cyber Security
with Certified Ethical Hacking V13 with AI
Module 01: Prerequisites for Ethical Hacking
- Introduction to Ethical Hacking and Cyber Kill Chain
- Networking Fundamentals:
- IP addresses and their categories
- Networking Protocols – DNS, DHCP, Telnet, SSH, FTP
- Assigning IP addresses
- MAC Address
- Lab Setup Installation – Installing and Managing Virtual Machines
- Linux 101 – Understanding the Linux Architecture and Commands
- Spoofing of IP and MAC Addresses
Module 02: Footprinting and Reconnaissance
- What is Footprinting?
- Techniques of WHOIS, DNS, Email Footprinting
- Demonstrate Footprinting through
- Search Engines
- Internet Research Sites
- Google Hacking Database and much more
- Using Advanced Kali based tools for Footprinting
- Making Footprinting easier with AI
Module 03: Scanning Networks
- Ports and their categories
- Network Scanning using NMAP and other tools.
- Port Scanning
- Countermeasures for various scanning techniques
Module 04: Enumeration
- Service Enumeration such as
- DNS Enumeration
- NetBIOS Enumeration
- SMB Enumeration
- SMTP Enumeration and much more
- OS Enumeration
- Enumeration Countermeasures
Module 05: System Hacking
- What are password hashes?
- Password Cracking using Dictionary and Brute-force Attacks
- Password Bypassing
- Steganography and it’s use cases
Module 06: Malware Threats
- What are Malwares
- How to create Malwares such as:
- Viruses
- Worms
- Trojans
- Spywares
- Detecting Malwares and Defending against them
Module 07: Sniffing
- Packet Sniffing using Wireshark
- Man-in-the-middle Attacks
- Countermeasures against sniffing attacks
Module 08: DOS and DDOS Attacks
- What are DOS Attacks?
- What are DDOS Attacks?
- Tools to perform DOS and DDOS Attacks
- Countermeasures to mitigate DoS/DDoS attacks
Module 09: Social Engineering
- What is Phishing?
- Stealing credentials from replicated login pages
- Countermeasures against social engineering
Module 10: Vulnerability Analysis
- Vulnerability scanning using Nessus
- Generating Vulnerability scanning Reports
- Performing Vulnerability Assessment using Metasploit Framework
- Analysing CVEs and risk mitigation strategies
Module 11: Evading IDS, Firewalls, and Honeypots
- What are Firewalls
- What is IDS and IPS
- Snort IDS/IPS
- What are honeypots
- Evading techniques and mitigations
Module 12: Hacking Web Servers
- Scanning web servers
- Exploiting vulnerabilities on backend services
- Gaining remote connection through vulnerable services
- Countermeasures and mitigations for web server attacks
Module 13: Hacking Web Applications
- HTTP Requests and Responses
- Intro to OWASP Top 10 Framework
- Using Burp Suite to intercept requests and find vulnerabilities
- Learning Web application attacks such as:
- SQL Injections
- Cross Site Scripting
- File Upload Vulnerability
- Broken Authentication and Session Hijacking
Module 14: Hacking Wireless Networks
- Basics of wireless standards, encryption protocols
- Hacking wireless networks: WEP cracking, WPA/WPA2 attacks
- Tools for wireless network penetration testing (e.g., Aircrack-ng, Reaver)
- Countermeasures for securing wireless networks
Module 15: Hacking Mobile Platforms
- Android Safety Measures
- Android Hacking Using Rats
- Detection of Malicious Apps
- Android and IPhone Password Bypassing Tools
Module 16: Cryptography
- Basics of Cryptography and Encryption Types
- Symmetric and Asymmetric Encryptions
- Difference between Encryption and Encoding
Module 17: IoT Hacking
- What is Internet of Things
- Tools used for IoT Hacking
- Countermeasures
Module 18: Cloud Computing
- Cloud Security Risks and Best Practices
- Cloud Penetration Testing Methods
- Vulnerability Assessment for Cloud Infrastructure
- Securing Cloud Environments
Module 19: Bonus Module
- Intro to Security Operations Center
- What is Splunk
- Reverse Engineering and Malware Analysis Resources
- CTF Challenge to Assess and Review Key Concepts