EXACKTs Ethical Hacking Cyber Security
EXACKTs Ethical Hacking Cyber Security
Course Datasheet
Course Objective
The 75 hours comprehensive training program will help a learner to understand the fundamentals of ethical hacking
followed by understanding concepts like DOS, viruses, SQL injection and Cyber Security.
CEH – Module 1
Network Concept Need & Advantage of Virtualization
▪ What is Network? • Requirements for virtualization
▪ What is IP and types? • Creating virtual machines and optimization
▪ Network Topology; Internet working performance
▪ Domain Name; Server • Installing OS (Windows and Linux) On Virtual
▪ Ports and Types of Ports Machines
▪ Introduction to Web Browser • Virtual networking what and why?
Ethical Hacking & Cyber Security & Overview
▪ Cybercrime scenario in India and worldwide Information Gathering
▪ Short description about hacking vs. Ethical • What Is Information Gathering & Why Hackers
hacking Need This?
▪ Skill Profile of a Hacker • Types of Information Gathering
▪ Some Famous Hackers and Groups • Information Gathering Using Websites
▪ Cyber World • Information Gathering Using Software
▪ Advantage and Disadvantage of Cyber world • Search Engines- Smart Way of Information
▪ Types of Hackers; Classes of Hacker Gathering
▪ Security Challenges • Ping; Who-is-Lookup;PeopleSearch; DNS Lookup
▪ Skills required for an Ethical Hacker • Benefits of Foot printing
Overview of Cyber Law Windows, Linux hacking & Security
▪ Cyber Laws Indian
• Introduction Windows Security
▪ Technical Aspect of Indian Cyber Law
• User Accounts Security, Attacks and
▪ IT ACT 2000 & 2008
countermeasure
▪ Internet Crimes and Frauds
• Hacking into System by Changing Passwords
▪ Cyber Law Cases in India
• Getting Access to System by Elevating Privileges
▪ Organization Under Cyber Laws
• Finding Out the Passwords of Windows
▪ Advantages of Cyber Laws
• Bypassing the Windows Security
▪ Computer virtualization technology & lab setup
Page 1 of 2
E-Mail: [email protected] W: www.techfleeters.com
Contact: +919024640640 FB: www.fb.com/techfleeters
• Data recovery SQL Injection
• Steganography and cryptography • SQL Injection Attacks
• Desktop exploitation & data hiding • How Web Applications Work?
• Fake calling & SMS • SQL Injection Detection
Mobile Phone • Types of SQL Injection
• Use of mobile in hacking • How to Defend Against SQL Injection Attacks?
• Hidden function of mobile; Backdoor Attack Wireless Hacking
Denial of Service Attack (DOS – attack) • Wireless Standards
• What is a Denial of Service Attack? • Common Vulnerabilities in Wireless Devices
• What is Distributed Denial of Service Attacks? • Encryption Standards Used in Wi-Fi
• DoS Attack Techniques • WEP Cracking
• Detail Study on DoS Attack Tools • WPA/WPA2 Cracking
Hacking by Viruses, Trojans, Key Loggers • WPS Cracking
• What is virus? What is Trojan? • Solve Security challenges
• Trojans/viruses Attack Linux Training
• Different way a Trojan can get into a system • What is Linux & how to operate this OS
• How Attacker Bypass Your Antivirus by Trojans • Use of Linux
VPN Technology • Wi-Fi cracking & security
• Proxy and Types of Proxies • Pen-testing (Site Cloning)
• Why Hackers Use Proxy? • Network Find
• How to Hide IP Address While Chatting • Network scanning
• How to Open Blocked Websites • DNS Hacking (Server hacking)
• Convert Your Machine as Proxy Server with • What is DNS.??
HTTPS Proxy • DNS Attack
• Advantage and Disadvantage of Proxy • FACEBOOK/Any Mail id HACKED!!!
• How Proxy Hack Your Passwords Etc. • Security
• What Is VPN? Why We Use VPN? • Wi-Fi jammer
• Free VPN • Armitage
• NMAP
E-mail/Social Sites Hacking and Security Issues • Terminal Function
• Analysis Email Attacks (Live Demo) Manually & Security
Automatic • Facebook/mail Account Security
• Cookies Stealing (Session Hijacking) of All Big • WhatsApp Security
Mail Servers • Android phone Security
• Phishing Attacks (Normal & Advanced) Cyber Crime: Case Study
• Analyzing Fake & Real Profiles & Email Accounts • Introduction to cyber-crime and investigation
• Fake Mailing Attack • Types of cyber crimes
• Email & Fake Profile Tracing • Investigation Rules
• Facebook Phishing Attacks
• Facebook Account security with Email & SMS
Notification
How to Apply?
• Just log-on to www.techfleeters.com/apply and fill the form
• After successful submission of the application form, make a payment of minimum INR 1,000/- to the
given payment links on the page or the link: www.techfleeters.com/pay
• Share the screenshot or the transaction Id of the payment to [email protected]
Page 2 of 2
E-Mail: [email protected] W: www.techfleeters.com
Contact: +919024640640 FB: www.fb.com/techfleeters