Call
whatsapp
9447387064 | 9847003556
8089080088
Home | About Us | Software Development
IT Training | Placement | Contact Us | Location

No.1 Development Solution

INTERVIEW & EXAM PREPARATION
HOME CCNA

Introduction to Ethical Hacking

Ethical Hacking:
To crack passwords or to steal data? No, it is much more than that. Ethical hacking is to scan vulnerabilities and to find potential threats on a computer or networks. An ethical hacker finds the weak points or loopholes in a computer, web applications or network and reports them to the organization. So, let’s explore more about Ethical Hacking step-by-step.

These are various types of hackers:

(1) White Hat Hackers (Cyber-Security Hacker)           
(2) Black Hat Hackers (Cracker)                         
(3) Gray Hat Hackers (Both) 

 

  1. White Hat Hackers:
    Here, we look for bugs and ethically report it to the organization. We are authorized as a user to test for bugs in a website or network and report it to them. White hat hackers generally get all the needed information about the application or network to test for, from the organization itself. They use their skills to test it before the website goes live or attacked by malicious hackers.
  2. Black Hat Hackers:
    Here, the organization doesn’t allow the user to test it. They unethically enter inside the website and steal data from the admin panel or manipulate the data. They only focus on themselves and the advantages they will get from the personal data for personal financial gain. They can cause major damage to the company by altering the functions which lead to the loss of the company at a much higher extent. This can even lead you to extreme consequences.
  3. Grey Hat Hackers:
    They sometimes access to the data and violates the law. But never have the same intention as Black hat hackers, they often operate for the common good. The main difference is that they exploit vulnerability publicly whereas white hat hackers do it privately for the company.

ENQUIRE NOW

RELATED COURSES

  • CCNA TRAINING
  • CCNP TRAINING
  • MCTS TRAINING
  • MCSE TRAINING
  • MCSA TRAINING
OUR TIMINGS
DAYS
From
To
Week Days 07:00 AM 06:00 PM
Week End 08:00 AM 06:30 PM

Ethical Hacking

MODULE 1 - OS/NETWORK

  • OSI layers
  • Networking Basics
  • IP and Subnets
  • OS Basics
  • Windows Basics
  • Windows Installation
  • Windows Networking
  • Linux Basics
  • Linux Installation
  • Linux Networking
  • Advanced Networking with Windows and Linux
  • Users and Permissions management in Windows and Linux
  • Disk and Device management in Windows and Linux

MODULE 2 - NETWORK SECURITY

  • Mastering Zenmap/Nmap scanner ( Aggressive scan, OS detection, Service detection, Templates and more)
  • Nessus Security vulnerability scanner
  • Setoolkit
  • Mastering Metasploit ( msfconsole,armitage)
  • Packet crafting with Colasoft packet builder,hping3 & scapy
  • Hacking Systems and Networks
  • Hijacking Web Servers
  • Hacking FTP Server
  • WIRELESS sniffing and hacking
  • Packet crafting (MODIFY IP,PACKET HEADER, PARAMETERS, be fool the server)
  • Netcat nc
  • ARP Poisoning
  • MITM-Man In The Middle attack
  • Secure Network design
  • Countermeasures for Network Attacks
  • Firewall Evasion Techniques

MODULE 3 - OS AND DATABASE SECURITY

  • Possible threats to Windows OS and countermeasures
  • Brute force dictionary attack
  • Rainbow Table attack
  • Password Salting
  • Possible threats to Linux OS and countermeasures
  • Linux security measures for Passwords ( Taking access to/etc/shadow or /etc/users)
  • Remote computer hijacking with trojan and RAT
  • Secure windows server architecture
  • Server hardening of Windows server
  • Server hardening of linux server
  • Database security principles
  • Database vulnerabilities

MODULE 4 - WEB APPS SECURITY

  • Basics of Webservers and Websites
  • Intercepting http requests using OWASP ZAP Tool
  • Intercepting http requests using burpsuit and tampering data
  • Session hijacking using ZAP Proxy
  • Security mis-configurations in servers-Nikto
  • Remote code execution vulnerability exploit
  • Remote and Local file inclusion vulnerability exploit
  • SQL injection attack and conutermeasures
  • Cross site scripting attack and countermeasures
  • Cross site request forgery attack and countermeasures
  • Miscellaneous web platform security issues and countermeasures
  • Website code review and secure coding principles
  • Denial of service (DOS) and distributed denial of service (DDOS) attacks and countermeasures

MODULE 5 - FORENSICS

  • Legal study of evidence acquisition
  • Forensics steps in real time incident handling
  • RAM/Memory forensics
  • Disk based forensics
  • Network Forensics
  • Data packet analysis
  • Mobile forensics
  • Browser forensics
  • USB forensics
  • Windows forensics
  • Volatility and Encase
  • Data recovery tools

MODULE 6 - STANDARDS/COMPLIANCE

  • Basic principles of assessment & auditing
  • IT LAWS and ACTS
  • HIPPA
  • CANSPAM ACT
  • ISO 27001:2005
  • PCI DSS
  • Risk Assessment
  • BCM

MODULE 7 - PROJECTS/REPORTS

  • Setting up Security Sandbox for Pen Test
  • Live Vulnerability assessment
  • Creating Reports
  • Final theory & Practical exam
Trinity Software Technologies
1st & 2nd Floor, Radheyam Tower, Gandhari Amman Kovil Road
Pulimood, Trivandrum.
Call: 9447387064 | 9847003556 | 0471-2335855 | 8089080088 | 0471-2334855
BSc Project, Msc Project, Btech Project, Mtech Project, MCA Project, Application Project, IEEE Project, PHP Project, ASP.Net Project, Java/J2EE Project, Python Project, Django Project, Angular Project, IOT Project, Internship in PHP, Internship in .Net, Internship in Java/J2EE, Internship in Networking, Internship in Ethical Hacking, Internship in Linux