0 reviews

Ethical Hacking online course Coming Soon

Ethical Hacking Course
32 students enrolled
  • Description
Ethical Hacking online course

    Up-and-Coming Class Info
    Shashi Rajan Jha
    45 Hours / 2 Months
    Course Start Date
    Coming Soon
    Sat-Sun 7:30 AM - 10:30 AM

    About Ethical Hacking program

    The online ethical hacking course with GroTechMinds helps aspirants become pros. We've designed this course with your success in mind, making it accessible and practical. By the end, you'll be well-prepared to navigate the challenges and opportunities within the field of ethical hacking.

    Ethical Hacking Tools Covered

    Ethical Hacking course features
    Ethical Hacking Course Syllabus

    Introduction to Basics of Ethical Hacking

    -What is hacking
    -types of hackers
    -Why is ethical hacking important
    -Security vs. Functionality and Ease of Use
    -Phases of an Attack
    -Types of Hacker Attacks
    -Ethical Hackers
    -Vulnerability Research
    -Ethical Hacking Assignment
    C-omputer Crime

    Foot-printing Active (Tool-Based Practical)
    -Information Gathering Methodology
    -Archived Websites
    -Searching Public Records
    -Locating the Network Range
    -Conducting Active and Passive -Reconnaissance Against a Target
    -Scanning Networks
    -Scanning Methodology
    -Three-Way Handshake
    -Types of Port Scans
    -Using Nmap

    Foot-printing Passive (Passive Approach)
    -Researching capabilities
    -OSINT investigation

    In-depth Network Scanning
    -Steps to Compromise a System
    -NetBIOS Basics
    -Command-Line Tools
    -SNMP Enumeration
    -Discovering Hosts with Windows -Command Line Tools
    -Discovering Hosts with -Metasploit�

    Enumeration User Identification
    -user Osint
    -THM labs

    System Hacking Password Cracking & Bypassing
    Password Attacks: Passive Online Attacks
    Password Attack Example
    Null Sessions
    Kerberos Operation
    Password Cracking
    Escalating Privileges
    Password Cracking
    Hiding Files

    Viruses and Worms
    -use cases
    -ways to create

    Trojan and Back door
    -use cases
    -ways to create
    -Tools Used to Create Trojans
    -Detecting Tools
    -Countermeasure Tools
    -Process Monitor

    Bots and Botnets
    -use cases

    Sniffers MITM with Kali

    Social Engineering -Techniques Theoretical Approach
    -types of SE
    -Use cases

    Social Engineering -Toolkit Practical Based Approach
    -use cases

    Denial of Service DOS & DDOS Attacks
    -use cases

    Web Session Hijacking
    -web fundamentals
    -OWASP top 10
    -htb labs

    SQL Injection Manual Testing
    Web Application Components
    SQL Injection Classifications
    Web Front End to SQL Server
    Manipulating the Input Fields
    Failed SQL Injection Attempt
    Using Client-Side Validation
    Successful Login
    Using a Stored Procedure
    Injection Results
    Injecting Username

    Sql Injection automated Tool-Based Testing
    blind sqli

    Basics of Web App Security
    -web application attacks

    Hacking Web servers Server Rooting
    Web Server Security Vulnerabilities
    Web Server Attacks

    Hacking Wireless Networks Manual CLI Based

    Hacking Wireless Network
    Types of Wireless Networks
    Wireless Standards
    Hacking Wireless Networks
    Rogue Access Points
    Iwconfig Command
    Aireplay -ng Command
    Monitoring an Unsecured WLAN
    Using Aircrack –ng

    Evading IDS, Firewall
    -nmap flags
    -use cases
    -whitelisting vs blacklisting

    -symmetric encryption
    -assymetric encryption

    Penetration Testing: Basics
    -ttp’s (tools , techniques, procedures)
    -checklist for pentesting
    -hacker101 labs

    Mobile Hacking
    -android Trojans
    -android security

    Internet of Things (IoT) Hacking
    -Fundamentals of IOT
    -IOT security
    -Shodan for IOT

    Thank You

    Who Should enroll this course
    Our Rockstar works at below companies
    Download Brochure
    Get our brochure and take a look at our curriculum. We've designed it to ensure you gain valuable skills, plus we provide 100% job placement support. Start your journey to a successful career today!"
    Download Full Stack Development PDF